SlideShare a Scribd company logo
Chapter 2
Information Security Related Intellectual Property Rights
03/24/25 Resource Person: Mrs. Pradnya Kashikar 1
Computer Software and Intellectual Property
03/24/25 Resource Person: Mrs. Pradnya Kashikar 2
Objectives: IP Protection
• Many forms
• Copyright, Trade Mark, Patent, Trade
Secrets, etc.
• Licensing allows competing companies
to work together
• Create new innovation and standards
03/24/25 Resource Person: Mrs. Pradnya Kashikar 3
Information Economy
• Knowledge and information key assets,
key driver
• Better IP protection leads to better
creativity, competition, economic success
03/24/25 Resource Person: Mrs. Pradnya Kashikar 4
Software Piracy
• Asia Pacific: study shows 55% of software
is pirated
• Worldwide average is 35%
• Costly to industry
• Damages not just international companies
but also domestic companies
• Deprives countries of jobs and revenues
• Lacking respect for intangible property
03/24/25 Resource Person: Mrs. Pradnya Kashikar 5
Foreign Investment
• Good IP regime a key factor
• Companies who want to invest and
compete need to know and work in
environment where ideas and innovation
are protected
• Benefits
• Scientific and technological progress
• Knowledge transfer
03/24/25 Resource Person: Mrs. Pradnya Kashikar 6
Local Investment
• Local companies also benefit
• Better position to negotiate with large
companies
• Cross-licensing, buy-out
• Invest in new resources, R&D through
licensing and royalties
• Benefits both large and small companies
• Lack of IP respect or protection
=> lack of incentive to invest in R&D
03/24/25 Resource Person: Mrs. Pradnya Kashikar 7
Revenue
• International software products
• Benefits both local and international
companies
• Local industry earns more than international
companies from products
• Local industry involved in distribution
channels, IT services market, support,
maintenance, add-on, etc.
03/24/25 Resource Person: Mrs. Pradnya Kashikar 8
Reducing Piracy
• Significant benefits in reducing piracy rate
• Studies show benefit of 10 point reduction
• Asia – reduction of 10 points over 4 year create:
• Additional 2 million jobs
• Additional US 135 billion contribution to GDP
• Of which 80% revenue to local vendors
03/24/25 Resource Person: Mrs. Pradnya Kashikar 9
Future of Asia Pacific
• Asian companies can become formidable
international force
• Must lead in innovation, and not mere
followers or adopters of technology
• Need IP protection to have incentive for
people to devote time, effort, resources
to innovate
03/24/25 Resource Person: Mrs. Pradnya Kashikar 10
Copyright Protection:
Software Models
• Development Model
• Business Model
• Licensing Model
03/24/25 Resource Person: Mrs. Pradnya Kashikar 11
Software Development Models
• Open Source
• Collaborative – different people, different places, no formal association –
contributing elements towards final software
• Not exclusively so today
• Large companies also release in-house applications to community
• Commercial Software
• Usually developed by a commercial entity
• Internal teams, though maybe over large geographical area or even
international borders
03/24/25 Resource Person: Mrs. Pradnya Kashikar 12
Software Business Models
• Open Source
• Not primarily on the software product
• Revenue model is on supporting services and hardware
• System integrators
• Commercial Software
• Focus is on the product
• Revenue on customer buying products and its upgrades
• Motivation for customer to buy next version if it is more
innovative and has improved functionality
03/24/25 Resource Person: Mrs. Pradnya Kashikar 13
Software Licensing Models
• Open Source
• Source code usually provided royalty free
• Terms on redistribution, modification, addition stipulated, rather than requirement for fee to
be paid
• Commercial Software
• Product sold or licensed to customer, In object code or executable form, for a fee
• Source code may be made available to certain users through special licensing or other
arrangement, but not to general users
• Usually not to be copied or modified, except as provided in arrangement
03/24/25 Resource Person: Mrs. Pradnya Kashikar 14
IPR and Software Development
• Both models rely on IPR protection
• Netfilter Project v Sitecom Germany GmbH case
• Defendant used open source code within proprietary solution
• Plaintiff initiated action to ask defendant to disclose proprietary solution
• Plainitff had course of action because of copyright in code
• Could not initiate action in other instances because no copyright
03/24/25 Resource Person: Mrs. Pradnya Kashikar 15
Technical Issues
• Cost
• Security
• Flexibility
03/24/25 Resource Person: Mrs. Pradnya Kashikar 16
Implications – Piracy
• Not a solution to software piracy problem
• Software products not like other consumer-oriented commodity products
• Different productivity gains; akin to engaging professional services
• Where piracy rates are high, lower cost of software does not deal with lack of mindset to buy
legitimate copies
• Buyers of computers loaded with open source obtain pirated copies of commercial software
to replace
• Both open source and commercial software predicated on strong copyright protection
03/24/25 Resource Person: Mrs. Pradnya Kashikar 17
Implications – Piracy
• Developer’s perspective
• Risk assessment on code base and code reuse
• Inadvertently use code subject to GPL [General Public License]?
• Risk of being sued by competitor
• Piracy of a different form
• Disregard of licensing terms
• Incorporation into commercial products
03/24/25 Resource Person: Mrs. Pradnya Kashikar 18
Resource Person: Mrs. Pradnya Kashikar 19
• Software is protected by:
(1) Copyrights – rights enforceable by law and accorded to an artist,
inventor/creator of an expression or creative works: literary,
dramatic, musical, pictorial, graphics, artistic, audiovisual,
architectural, or sound recording.
• The protected works must have:
• Tangible form(expression)
• Originality
• Fixation in a medium
03/24/25
Resource Person: Mrs. Pradnya Kashikar 20
• Copyrights are now universally accepted
• International enforcement conventions include:
• WIPO- world intellectual property organization
• UNESCO
• UCC- universal copyright convention
• WTO – World Trade Organization
• Once a copyright expires the work goes in public domain
03/24/25
Resource Person: Mrs. Pradnya Kashikar 21
• Public works include:
• Non-copyrightable items( ideas, facts, schedules, names, etc..)
• Copyrightable items whose copyrights have expired
• Copyrightable works put in public domain by the author
• Duration of copyrights:
• Depends on country
• In U.S.( before 1978, 75 years from date of issue, after 1978
lifetime of author plus 50 years)
03/24/25
Resource Person: Mrs. Pradnya Kashikar 22
(2) Patents – protection of inventions and discoveries
• What is protected must be:
• New and useful
• Improvement of any of the following:
• Process, manufacturing( products that are not machines),
machines(covering mechanism, mechanical products and
composition)
• Utility, Novelty, nonobvious, there must be no disclosure.
• Protection duration in U.S. is 17 years
03/24/25
Resource Person: Mrs. Pradnya Kashikar 23
• (3) Trade Secrets
• Information that gives a company a competitive advantage
over the others
• No one specific definition of trade secrets
• It’s a collection of information in a static format with a
strategic importance
• Duration is infinite if no disclosure
03/24/25
Resource Person: Mrs. Pradnya Kashikar 24
• The following characterize trade secrets:
• Extent the information is known outside the business
• Extent of measures taken to protect the trade secrets
• Value of information to the owner
• Amount of money spent by owner to develop the information
• Ease/difficulty of acquiring such information
03/24/25
Resource Person: Mrs. Pradnya Kashikar 25
• (4) Trademarks – product identifying labels
• Include:
• Service marks
• Certification marks
• Collective marks
• Characteristic of trademarks include( see page 138/139):
• Arbitrary marks (say nothing but used for service)
• Suggestive marks (symbols and writings)
• Descriptive marks ( intended purposes)
• General marks (unrelated and not suggestive)
• Duration of trademarks in U.S. is 10 years
03/24/25
Resource Person: Mrs. Pradnya Kashikar 26
• Trademarks are registered in U.S. if they:
• Are in good taste for the public
• Have no suggestive connotations to their origin
• Are not symbols of any recognizable country
• Do not use people’s likeness without permission
03/24/25
Database and Data Protection
03/24/25 Resource Person: Mrs. Pradnya Kashikar 27
Data Protection Act (1998)
• What is the Data Protection Act (1998) and
why was it created?
• What are the eight principles of the Data
Protection Act?
• Data Protection Act: What rights do we
have?
• What is an Information Commissioner, Data
Controller and Data Subject?
• Are there any exemptions to the Data
Protection Act?
03/24/25 Resource Person: Mrs. Pradnya Kashikar 28
Data Protection Act (1998)
What is it and why was it created?
The Data Protection Act was developed to
give protection and lay down the rules about
how personal data can be used.
It was created to protect individuals from
misuse of this data. It governs the
collection and processing of data by
organisations and the individual rights to
access the data if they wish.
03/24/25 Resource Person: Mrs. Pradnya Kashikar 29
Data Protection Act (1998)
What are the eight principles of it?
1. Data must be kept secure;
2. Data stored must be relevant;
3. Data stored must be kept no longer than necessary;
4. Data stored must be kept accurate and up-to-date;
5. Data must be obtained and processed lawfully;
6. Data must be processed within the data subject rights;
7. Data must be obtained and specified for lawful purposes;
8. Data must not be transferred to countries without adequate
data protection laws.
03/24/25 Resource Person: Mrs. Pradnya Kashikar 30
Data Protection Act (1998)
What rights do we have as data subjects?
• To be supplied with the data held about
us;
• To change incorrect data;
• To prevent data being used about us if it
will cause distress;
• To stop data being used in attempts to sell
us something;
• To use the law to gain compensation.
03/24/25 Resource Person: Mrs. Pradnya Kashikar 31
Data Protection Act (1998)
What is an Information Commissioner, Data Controller
and Data Subject?
Information Commissioner: Person who
has the power to enforce the Act.
Data Controller: Person or Company that
collects and keeps data about people.
Data Subject: Person who has data about
them stored outside their direct control.
03/24/25 Resource Person: Mrs. Pradnya Kashikar 32
Data Protection Act (1998)
Are there any exemptions to the Data Protection Act?
• Any data held for National Security
reasons e.g. MI5
• Police can access personal information in
order to solve crimes.
• The taxman can access personal
information to ensure people pay their tax!
• Any data held for domestic purposes at
home e.g. birthday lists, address books.
03/24/25 Resource Person: Mrs. Pradnya Kashikar 33
Computer Misuse Act (1990)
• What is the Computer Misuse Act (1990)
and why was it created?
• What are the three principles of the
Computer Misuse Act?
03/24/25 Resource Person: Mrs. Pradnya Kashikar 34
Computer Misuse Act (1990)
What is it and why was it created?
The Computer Misuse Act (1990) was
developed to cope with the problems of
computer hackers and viruses.
Hacker:
Unauthorised user
who attempts to or
gains access to an
information system
Virus: A virus is a
program written to
cause mischief or
damage to a
computer system.
03/24/25 Resource Person: Mrs. Pradnya Kashikar 35
Computer Misuse Act (1990)
What are the three principles of the Act?
1. It is illegal to access unauthorised data
e.g. Hacking.
2. It is illegal to access unauthorised data
and intend to do it again e.g. Blackmail
and fraud purposes.
3. It is illegal to access unauthorised data
and amend it e.g. Planting Viruses and
deleting files.
03/24/25 Resource Person: Mrs. Pradnya Kashikar 36
Copyright, Design and Patents
Act (1988)
• Introduced to protect people who have
created original pieces of work.
• Books, Music, Films, Games, Applications.
• 2 main purposes of the Act:
• To ensure people are rewarded for
their endeavours.
• To give protection to the copyright
holder if someone tries to steal their
work.
03/24/25 Resource Person: Mrs. Pradnya Kashikar 37
Copyright, Design and Patents
Act (1988)
• The Act protects a wide range of work…
written and computer based.
• Includes:
• Copying Software;
• Copying or Downloading music;
• Copying images or photographs from
the Web;
• Copying text from web pages.
03/24/25 Resource Person: Mrs. Pradnya Kashikar 38
1. Personal data shall be processed fairly and lawfully
2. Personal data shall be obtained only for one or more
specified and lawful purposes, and shall not be further
processed in any manner incompatible with that
purpose or those purposes.
3. Personal data shall be adequate, relevant and not
excessive in relation to the purpose or purposes for
which they are processed.
4. Personal data shall be accurate and, where necessary,
kept up to date.
THE MORAL DIMENSIONS OF INFORMATION SYSTEMS
Data Protection Act Principles
03/24/25 Resource Person: Mrs. Pradnya Kashikar 39
5. Personal data processed for any purpose or purposes shall not
be kept for longer than is necessary for that purpose or those
purposes.
6. Personal data shall be processed in accordance with the rights of
data subjects under this Act.
7. Appropriate technical and organisational measures shall be taken
against unauthorised or unlawful processing of personal data and
against accidental loss or destruction of, or damage to, personal
data.
8. Personal data shall not be transferred to a country or territory
outside the European Economic Area unless that country or
territory ensures an adequate level of protection for the rights and
freedoms of data subjects in relation to the processing of personal
data.
THE MORAL DIMENSIONS OF INFORMATION SYSTEMS
Data Protection Act Principles
03/24/25 Resource Person: Mrs. Pradnya Kashikar 40
• National Security
• Crime, Taxation
THE MORAL DIMENSIONS OF INFORMATION SYSTEMS
Exemptions from the Data Protection Principles
03/24/25 Resource Person: Mrs. Pradnya Kashikar 41
THE MORAL DIMENSIONS OF INFORMATION SYSTEMS
Safe harbor:
• Private self-regulating policy and enforcement
mechanism that meets the objectives of government
regulators but does not involve government
regulation or enforcement. Example: U.S.
corporations doing business in Europe must process
their data in a “safe harbor” where the European
rules of privacy are in force
• “Safe harbor” status is granted by the EU after
certification by a trusted third party, e.g. a
recognized public account firm.
03/24/25 Resource Person: Mrs. Pradnya Kashikar 42
Transborder dataflows
• Flow of information across national borders
• Much of this data involves personal information
03/24/25 Resource Person: Mrs. Pradnya Kashikar 43
Examples of transborder personal data
• An American buys a book from a bookstore in England
• Information on the sale and payment cross two national borders
• A Spaniard does contract work with a company in Canada
• Information regarding payment crosses two national borders and earnings
information is registered with two internal revenue agencies
03/24/25 Resource Person: Mrs. Pradnya Kashikar 44
National Differences
• Definition
• US, Canada and France
• Define protections of personal data in terms of privacy
• Most of the European countries
• Define it as data protection
• Omnibus legislation versus sectoral rules
03/24/25 Resource Person: Mrs. Pradnya Kashikar 45
More national differences
• US
• Privacy issues are driven by consumerism and free trade—
stress on free flow of information and often cite the First
Amendment for support
• European and some other countries
• Privacy issues and data protection policies protect
fundamental rights of citizens—reflects belief that
governments have a duty to protect privacy of citizens
03/24/25 Resource Person: Mrs. Pradnya Kashikar 46
Definition:-
• A safe harbor is a provision of a statue or a regulation that specifies
that certain conduct will be deemed not to be violate a given rule
• It is a set of a rules which decided by EU & US.
• The US safe harbor principle were developed between 1998-2000.
• It includes 7 principles.
03/24/25 Resource Person: Mrs. Pradnya Kashikar 47
• Who manage these
organization?
-US Department of commerce
-Federal Trade Commission
03/24/25 Resource Person: Mrs. Pradnya Kashikar 48
Safe Harbor Principles
• Notice: notify individuals about purpose; any third party disclosures;
contact information
• Choice: must provide opt-out as far as third party disclosure or
incompatible use; opt-in for sensitive information
• Onward Transfer (third party): assure that the third party also follows
notice and choice
03/24/25 Resource Person: Mrs. Pradnya Kashikar 49
Safe Harbor Principles
• Access: individuals must have access to personal information and
right to amend or delete if inaccurate
• Security: reasonable precautions to protect information
• Data Integrity: personal information must be relevant for the
purpose it is to be used; ensure data is reliable for intended use
• Enforcement: independent recourse mechanism
03/24/25 Resource Person: Mrs. Pradnya Kashikar 50
Private Sector Enforcement
• Must have dispute resolution system in place
• Must remedy problems arising out of noncompliance
• Remedies have to be strong enough to encourage compliance
• Must include publicity for findings of noncompliance
03/24/25 Resource Person: Mrs. Pradnya Kashikar 51
Government Enforcement
• Federal Trade Commission
• Counts as unfair and deceptive trade practice
• Department of Transportation
• Airlines and ticket agents
03/24/25 Resource Person: Mrs. Pradnya Kashikar 52
List of companies
• http://export.gov/safeharbor/
03/24/25 Resource Person: Mrs. Pradnya Kashikar 53
Protection of Semi-conductor Chips
03/24/25 Resource Person: Mrs. Pradnya Kashikar 54
What is TRIP’s?
• The Agreement on Trade-Related Aspects of
Intellectual Property Rights (TRIPS).
• Is an international agreement administered by the
World Trade Organization (WTO).
• The TRIPS Agreement ... is to date the most
comprehensive multilateral agreement on intellectual
property
• It was negotiated at the end of the Uruguay Round of
the General Agreement on Tariffs and Trade (GATT) .
• Introduced in 1994.
03/24/25 Resource Person: Mrs. Pradnya Kashikar 55
• TRIP is available in three languages English,French,Spanish.
• The areas of intellectual property that it covers are:
1. copyright and related rights (i.e. the rights of performers,
producers of sound recordings and broadcasting
organizations);
2.trademarks including service marks;
3.geographical indications including appellations of origin;
4.industrial designs;
5.patents including the protection of new varieties of plants;
6.the layout-designs of integrated circuits;
7.undisclosed information including trade secrets and test
data.
03/24/25 Resource Person: Mrs. Pradnya Kashikar 56
Features of TRIP…
1) Standard :-
In respect of each of the main areas of intellectual property covered by the
TRIPS Agreement, the Agreement sets out the minimum standards of
protection to be provided by each Member.
2) Enforcement :-
The second main set of provisions deals with domestic procedures and
remedies for the enforcement of intellectual property rights. The
Agreement lays down certain general principles applicable to all IPR
enforcement procedures.
03/24/25 Resource Person: Mrs. Pradnya Kashikar 57
3) Dispute Settlement :-
The Agreement makes disputes between WTO
Members about the respect of the TRIPS obligations
subject to the WTO's dispute settlement procedures.
03/24/25 Resource Person: Mrs. Pradnya Kashikar 58
Members of TRIP Agreement
• Two third members of WTO accepts the permanent
changes made on 6 December 2005 related to
patents and public health.
• Albania (28 January 2009).
• Australia (12 September 2007).
• China (28 November 2007).
• Egypt (18 April 2008).
• Japan (31 August 2007).
• United States (17 December 2005).
• Switzerland (13 September 2006).
• Sri Lanka (9 September 2015).
03/24/25 Resource Person: Mrs. Pradnya Kashikar 59
The Requirements of TRIP’s
• TRIPS requires member states to provide
strong protection for intellectual property
rights.
• For Example –
Copyright terms must extend at least 50
years, unless based on the life of the author.
(Art. 12 and 14).
Copyright must be granted automatically, and
not based upon any "formality," such as
registrations(Art. 9).
Computer programs must be regarded as
"literary works" under copyright law and
receive the same terms of protection.
03/24/25 Resource Person: Mrs. Pradnya Kashikar 60
Patents must be granted for "inventions" in all "fields
of technology" provided they meet all other
patentability requirements. Must be enforceable for
at least 20 years (Art 33).
03/24/25 Resource Person: Mrs. Pradnya Kashikar 61
Drawbacks of TRIP
• Central Vigilance System.
• No Amendments.
• Not defined Patent,Copyright,TradeMark.
• The resale rights depend upon
Reciprocity.
• There is no Proper Implementation of
DSB orders.
03/24/25 Resource Person: Mrs. Pradnya Kashikar 62
63
Resource Person: Mrs. Pradnya Kashikar
03/24/25
64
Resource Person: Mrs. Pradnya Kashikar
03/24/25
65
Resource Person: Mrs. Pradnya Kashikar
03/24/25
66
Resource Person: Mrs. Pradnya Kashikar
03/24/25
Need
Threat of chip piracy
Intel and Semiconductor Industry Association(SIA) took lead and filed
a considerable complaint
Hearings lead to enactment of SCPA(Semiconductor Chip Protection
Act) in 1984
What protects semiconductor ICs then?
• SCPA(US Legislation)
• SICLDA(Indian Legislation)
67
Resource Person: Mrs. Pradnya Kashikar
03/24/25
Semiconductor Chip Protection Act
(SCPA)
• Enactment by US congress in 1984
• Hybrid Law: Borrows from both patent and copyright
• Acquisition of protection by registration
• Fulfillment of obligations regarding Semiconductor IC
topographies by TRIPS agreement
• Suit is followed by other nations as well
68
Resource Person: Mrs. Pradnya Kashikar
03/24/25
Semiconductor Integrated Chip Layout Design
Act(SICLDA)
Adapted by Indian legislation in 2000
Who can apply?
• Creator of layout design/his legal representative
Procedure for registration
1.Filing of application in writing
2.Acceptance of the application with acknowledgement
3.Advertisement of application
4.Issuing Certificate
69
Resource Person: Mrs. Pradnya Kashikar
03/24/25
SICLDA(contd.)
Duration of Registration:10 years
Exclusions
Exclusive Right to the Register Proprietor
Registered User
Assignment and Transmission
Protection against Infringement
Innocent Infringement is allowed.
Adjudicating Authority
70
Resource Person: Mrs. Pradnya Kashikar
03/24/25
Highlights of Indian Legislation
Protection of semiconductor integrated circuits
layout and designs by a registration process.
A mechanism for distinguishing which layout designs
can be protected
rules to prohibit registration of layout designs which
are not original or which have been commercially
exploited.
Protection of 10 years period
Provisions regarding infringement and evidence of
validity are mentioned.
71
Resource Person: Mrs. Pradnya Kashikar
03/24/25
Highlights of Indian Legislation(contd.)
Provisions for determining payment of royalty for
registered layout designs in case of innocent or
unintentional infringement
Penalties in the form of imprisonment and fine are
imposed for willful infringement and other offences in
the Act.
The Registrar is appointed for the purpose of
administration and the Appellate Board is established
for facilitating the legal objective.
72
Resource Person: Mrs. Pradnya Kashikar
03/24/25
CONCLUSION
73
Resource Person: Mrs. Pradnya Kashikar
03/24/25
Domain Name Protection
03/24/25 Resource Person: Mrs. Pradnya Kashikar 74
Domain Names
A Domain name is a web address. For example:
www.marksandspencer.com
www.amazon.co.uk
www.ebay.co.uk
03/24/25 Resource Person: Mrs. Pradnya Kashikar 75
Domain Names
Domain names are in fact IP addresses. These are computer
addresses.
212.219.32.8 Is the Law School’s IP address.
The English translation of these numbers can be very lucrative.
03/24/25 Resource Person: Mrs. Pradnya Kashikar 76
Cybersquatting
Cybersquatting is a term that is used to describe a person who
registers a domain name and then offers it for sale to the true owner.
There has been some litigation on this issue.
03/24/25 Resource Person: Mrs. Pradnya Kashikar 77
Cyberlaw: Jurisdictional Issues
• Existing internet law is vague or does not completely cover
such issues as the protection of domain names, taxes,
jurisdiction in cross-border transactions, and contractual issues
• The European Union, the U.S. and many other countries are
drafting legislation to address the myriad legal questions not
clearly addressed by current law
• Laws being considered deal with Cybersquatters—those who
buy and register descriptive nouns, geographic names, ethnic
groups, pharmaceutical substances and other similar descriptors
and hold them until they are sold at an inflated price
• Another issue in e-commerce concerns the collection of taxes
on sale of products, i.e., when taxes should be collected, where
they should be collected, and by whom, are all issues under
consideration by countries around the world
03/24/25 Resource Person: Mrs. Pradnya Kashikar 78
Domain Name System (DNS)
• Basically, DNS is a global addressing system
• DNS allows users to go to a specific website by entering its
corresponding domain name
• DNS locates and translates domain names into IP addresses
03/24/25 Resource Person: Mrs. Pradnya Kashikar 79
Components of Domain Names
Second-level domain
www.inta.org
Top-level domain
03/24/25 Resource Person: Mrs. Pradnya Kashikar 80
Components of Domain Names:
Top-Level Domains
• Highest level in the DNS hierarchy
• Generic Top-Level Domains (gTLDs)
• Examples: .com, .net, .org
• Also, gTLDs for business or interest groups (e.g., .gov for the U.S. government, etc.)
• NEW gTLDs (e.g., .brand, .community, .geographical area)
• Country-Code Top-Level Domains (ccTLDs)
• Examples: .au for Australia, .mx for Mexico
• Internationalized Domain Names (IDNs)
• Contain local language characters such as accents and may include non-Latin scripts
• Examples: 香港 (Hong Kong), рф (Russian Federation)
03/24/25 Resource Person: Mrs. Pradnya Kashikar 81
Components of Domain Names:
Second-Level Domains
• Second-level domain names:
• Follows “www.” and precedes the top-level domain name
• Chosen by registrant
• Must be:
(1) unique term not previously used as a second-level domain name, and
(2) registered
03/24/25 Resource Person: Mrs. Pradnya Kashikar 82
New gTLD Names
• Examples of new gTLD names:
• by brand (.amazon, .dunlop), music and arts community (.theater, .band),
cause (.eco, .charity), geographic/cultural area (.nyc, .irish), etc.
• Companies and organizations will be able to create and operate a registry
business for the new gTLD
• The use of non-Latin characters (such as Cyrillic, Arabic, Chinese, etc.) will also be
allowed in gTLDs
• The initial application process closed on May 30, 2012
• The time period for a second round of applications has not yet been established,
but it will likely be at least a couple of years after the close of the initial round of
applications
03/24/25 Resource Person: Mrs. Pradnya Kashikar 83
New gTLD Names:
Trademark Owners’ Remedies
• The World Intellectual Property Organization (WIPO) is the exclusive
provider of dispute resolution services for trademark-based “Legal
Rights Objections” for the new gTLDs
(More info: http://www.wipo.int/amc/en/domains/newgtld/)
03/24/25 Resource Person: Mrs. Pradnya Kashikar 84
Timeline for New gTLDs
For the most up-to-date information, see:
• http://www.inta.org/Advocacy/Pages/gTLDs.aspx
• http://newgtlds.icann.org/en/applicants/agb
03/24/25 Resource Person: Mrs. Pradnya Kashikar 85
How Are Domain Names Registered?
• Internet Corporation for Assigned Names and Numbers (ICANN) manages domain
name system
(More info: http://www.icann.org/)
• ICANN-Accredited Registrars handle the actual registration of gTLDs
• National Registry or Local Registrars handle the actual registration of ccTLDs
03/24/25 Resource Person: Mrs. Pradnya Kashikar 86
Domain Name Disputes
Cybersquatting refers to when a party registers, without permission, a domain
name that is confusingly similar to a third-party trademark with the intention of
seeking to reap some type of commercial or financial benefit, often in an effort to
block the trademark owner from using the domain until the owner agrees to pay
an exaggerated sum for the domain.
03/24/25 Resource Person: Mrs. Pradnya Kashikar 87
Domain Name Disputes
• Typosquatting
• Domain Name Testing
03/24/25 Resource Person: Mrs. Pradnya Kashikar 88
Reactions to Cybersquatting
• Uniform Domain-Name Dispute-Resolution Policy (UDRP):
http://www.icann.org/en/help/dndr/udrp
• Anticybersquatting Consumer Protection Act 1999 (ACPA):
http://www.law.cornell.edu/uscode/text/15/1125
03/24/25 Resource Person: Mrs. Pradnya Kashikar 89
Uniform Domain-Name Dispute-Resolution
Policy (UDRP)
• International arbitration process for resolution of domain name disputes adopted
by ICANN
• Incorporated into domain name registration agreements of accredited registrars
• Also, registrants make certain representations regarding their domain names
(e.g., domain name registration will not infringe third-party rights, etc.)
• Only administrative alternative to going to courts
03/24/25 Resource Person: Mrs. Pradnya Kashikar 90
UDRP Service Providers
• World Intellectual Property Organization (WIPO)
• National Arbitration Forum (NAF)
• Asian Domain Name Dispute Resolution Centre
• The Czech Arbitration Court Arbitration Center for Internet Disputes
(More info: http://www.icann.org/en/help/dndr/udrp/providers)
03/24/25 Resource Person: Mrs. Pradnya Kashikar 91
Other Jurisdictions
• Many countries have their own policies and procedures
• Examples:
Mexico —Domain Name Dispute Resolution Policy for .mx (LDRP):
http://www.registry.mx/jsf/static_content/domain/policies_second.jsf
Israel—Procedures for Alternative Dispute Resolution under the
.il ccTLD by Dispute Resolution Panels (IL-DRP): http://www.isoc.org.il/domains/ildrp.html
(More Info: WIPO Arbitration & Mediation Center ccTLD Database:
http://www.wipo.int/amc/en/domains/cctld_db/)
03/24/25 Resource Person: Mrs. Pradnya Kashikar 92
• Patent licensing:
an important tool for e-businesses
Source: Idea Buyer
What are the challenges raised by the impact of e-commerce?
03/24/25 Resource Person: Mrs. Pradnya Kashikar 94
• Protection of software: different IP rights may protect
different aspects of software
Source: Espaço da Vaninha
Copyright: object
code, literal
components
Patent: new
technical
contributions
Designs: graphic user
interfaces, icons
Trade secrets: source
code
• Online content distribution
 Ease of upload, download and copying -» illegal
uploading and downloading of copyright materials
• As an e-commerce business:
 Protect your IP on the Internet
 Never distribute or permit downloads of content which does not
belong to your company
 Implement programs, policies and guidelines which ensure that your
employees understand IP related matters.
03/24/25 Resource Person: Mrs. Pradnya Kashikar 97
• Domain name issues
 DN must be available
 Conflicts of domain name with third parties’ trademarks or
personality rights
03/24/25 Resource Person: Mrs. Pradnya Kashikar 98
Technical tools/
Software
- Check license-based Terms&Conditions
- Get permissions
Copyrighted
works
- Finding info from CMOs
- Moral rights aspects
- Specifics of using photos
- Public domain material/freely available
material
Trademarks - Metatagging, linking, framing
- Marketing and advertising
Personal indicia - Privacy rights
- Publicity rights
03/24/25 Resource Person: Mrs. Pradnya Kashikar 99
• Domain names vs. trademarks
Domain Names Trademarks
Internationally available National/Regional IP rights
One domain name within one first
level domain
Possible coexistence of similar or
identical TMs (eg. different
classes)
Registration on first-comes first-
serves basis without examination
Examination (formal and/or
substantive)
Private contract with a registrar Registration by state/regional
authorities
Less expensive and quicker More expensive and longer
• Uniform Domain Name Dispute Resolution Policy
(UDRP)
 UDRP Rules adopted in 1999
 Reasons:
- Protection of trademark owners and legitimate domain name
registrants
- Effective fight and prevention against cybersquatting (with less
cost, shorter duration, etc.)
 Limited to cases of abusive registration of domain names
 More on UDRP procedure:
http://www.wipo.int/amc/en/domains/
03/24/25 Resource Person: Mrs. Pradnya Kashikar 101
• UDRP does not cover:
 Disputes regarding registrations which violate business (trade) names,
geographical indications or personality rights
 Situations which per se do not fall under the definition of ‘abusive
registration’ under UDRP
03/24/25 Resource Person: Mrs. Pradnya Kashikar 102
• Protected elements of a website
New technological systems
Search engines
Other technical internet tools
Software
Database
Website design
Website content
Business names, domain names
Product names, logos, other signs
Computer-generated graphic symbols,
screen displays, GUIs, webpages
Confidential graphics
Source code, object code, algorithms
Data flow charts, database contents, etc
03/24/25 Resource Person: Mrs. Pradnya Kashikar 103
• Types of protection
New technological systems
Search engines
Other technical internet tools
Software
Database
Website design
Website content
Business names, domain names
Product names, logos, other signs
Computer-generated graphic symbols,
screen displays, GUIs, webpages
Confidential graphics
Source code, object code, algorithms
Data flow charts, database contents, etc
Patents/utility
models
Copyright
Design
Sui generis/
database laws
Trademarks
Trade secrets
03/24/25 Resource Person: Mrs. Pradnya Kashikar 104
1 - To protect IP rights By registering trademarks
By registering domain names
By registering website and copyright (in case
such possibility is provided)
Patenting online business methods (in
countries where it is available)
2 - To let people know
that the content is
protected
By using symbols: ©, ®, etc
By using watermarks for copyright content
By giving notices that website or business
method is patented
 Precautionary measures
3 - To let people know
what use they can make
of the content
What they can do with the page
Who to contact to get a copyright clearance
related to website components
4 - To control access and
use of website content
By using online agreements to allow access
By using encryption (keys, etc.)
By using access control & conditional access
systems
 Precautionary measures (cont)
5 – To detect
infringements on website
By taking random snippets of text from
website and searching for the snippets using
search engines
By using ‘spider programs’ to detect illegal
use
• Taking action against infringers - steps
1 - Make screen shots or prints of relevant pages
2 - Print the source code from the infringing website
3 - Assure that you can prove your prior ownership over website
content and its originality
4 - Send ‘cease & desist’ letter to the owner of infringing website
5 - If no response received, send: (a) a notice about infringement to
any search engine and (b) a request to ISP with a demand to
remove the infringing site
• In short…
• If you want to use protected content in your website (art
works, photos, paintings, etc.), you need to get permission
from their creators or owners
• Websites which collect, handle or disclose personal
information of their users should comply with the national
privacy laws of the country from which they are operating
03/24/25 Resource Person: Mrs. Pradnya Kashikar 108
• In short…
• An outside contractor will usually own the right in the website
unless contractually agreed otherwise
• Domain names are unique: two companies can own and use
the same trademark, but only one company can own a
particular domain name
• In most countries, a registration of someone else’s trademark
as a domain name is a violation of trademark rights
03/24/25 Resource Person: Mrs. Pradnya Kashikar 109
• In short…
• Domain names are registered on a first-come, first-serve basis
• UDRP is an administrative procedure to solve disputes
between trademarks and domain names in case of abusive
registration
03/24/25 Resource Person: Mrs. Pradnya Kashikar 110

More Related Content

PPTX
ch 19- computer security prenciples and practice
PDF
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
PDF
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
PPT
IP Compliance.ppt
PDF
GDPR: The Application Security Twist
PPTX
Intellectual Property Strategies
PDF
IoTMeetupGuildford#13: Michele Nati - Open Innovation in the UK - Digital Cat...
PDF
Security and ethical challenges
ch 19- computer security prenciples and practice
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
IP Compliance.ppt
GDPR: The Application Security Twist
Intellectual Property Strategies
IoTMeetupGuildford#13: Michele Nati - Open Innovation in the UK - Digital Cat...
Security and ethical challenges

Similar to Chapter-2_Intellectual_Property_Rights.ppt (20)

PDF
Mind Your Business: Why Privacy Matters to the Successful Enterprise
PPTX
Assessing the impact of security services
PDF
The fourth industrial revolution
PPTX
Social Business =Cloud + Big Data + Social Media + Mobile Computing
PDF
Monetizing Game User Interface Innovations in Enterprise Applications
PPT
Ethical perspectives (it focus)
PDF
General Data Protection Regulation, May 2017, London
PPTX
The Future of Cybersecurity - October 2015
PPTX
Intellectual Property: What is intellectual property, and why is it important?
PPTX
Hiperstation Application Audit: Privileged User or Insider Risk
PDF
Flight East 2018 Presentation–You've got your open source audit report, now w...
PPTX
Erik Nachbahr "Dealership Technology"
PDF
The Diamond Datascram Diaries: Diamond Datascram Development
PPTX
How To Avoid Procuring Ip When Doing Procurement
PPTX
2014-04-04 Xurias - Marketing & soft IP
PDF
Today's Breach Reality, The IR Imperative, And What You Can Do About It
PPTX
Cyber Threat Overview for Euro IT counsel
PDF
Key Intellectual Property, Contract, and Information Technology Issues in an ...
PPT
3M Leading Through Innovation
PDF
Lean IP
Mind Your Business: Why Privacy Matters to the Successful Enterprise
Assessing the impact of security services
The fourth industrial revolution
Social Business =Cloud + Big Data + Social Media + Mobile Computing
Monetizing Game User Interface Innovations in Enterprise Applications
Ethical perspectives (it focus)
General Data Protection Regulation, May 2017, London
The Future of Cybersecurity - October 2015
Intellectual Property: What is intellectual property, and why is it important?
Hiperstation Application Audit: Privileged User or Insider Risk
Flight East 2018 Presentation–You've got your open source audit report, now w...
Erik Nachbahr "Dealership Technology"
The Diamond Datascram Diaries: Diamond Datascram Development
How To Avoid Procuring Ip When Doing Procurement
2014-04-04 Xurias - Marketing & soft IP
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Cyber Threat Overview for Euro IT counsel
Key Intellectual Property, Contract, and Information Technology Issues in an ...
3M Leading Through Innovation
Lean IP
Ad

Recently uploaded (20)

PDF
A systematic review of self-coping strategies used by university students to ...
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Complications of Minimal Access Surgery at WLH
PPTX
GDM (1) (1).pptx small presentation for students
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Lesson notes of climatology university.
PDF
Trump Administration's workforce development strategy
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
A systematic review of self-coping strategies used by university students to ...
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Computing-Curriculum for Schools in Ghana
O5-L3 Freight Transport Ops (International) V1.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Complications of Minimal Access Surgery at WLH
GDM (1) (1).pptx small presentation for students
O7-L3 Supply Chain Operations - ICLT Program
Chinmaya Tiranga quiz Grand Finale.pdf
Lesson notes of climatology university.
Trump Administration's workforce development strategy
human mycosis Human fungal infections are called human mycosis..pptx
Orientation - ARALprogram of Deped to the Parents.pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Anesthesia in Laparoscopic Surgery in India
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Microbial diseases, their pathogenesis and prophylaxis
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Ad

Chapter-2_Intellectual_Property_Rights.ppt

  • 1. Chapter 2 Information Security Related Intellectual Property Rights 03/24/25 Resource Person: Mrs. Pradnya Kashikar 1
  • 2. Computer Software and Intellectual Property 03/24/25 Resource Person: Mrs. Pradnya Kashikar 2
  • 3. Objectives: IP Protection • Many forms • Copyright, Trade Mark, Patent, Trade Secrets, etc. • Licensing allows competing companies to work together • Create new innovation and standards 03/24/25 Resource Person: Mrs. Pradnya Kashikar 3
  • 4. Information Economy • Knowledge and information key assets, key driver • Better IP protection leads to better creativity, competition, economic success 03/24/25 Resource Person: Mrs. Pradnya Kashikar 4
  • 5. Software Piracy • Asia Pacific: study shows 55% of software is pirated • Worldwide average is 35% • Costly to industry • Damages not just international companies but also domestic companies • Deprives countries of jobs and revenues • Lacking respect for intangible property 03/24/25 Resource Person: Mrs. Pradnya Kashikar 5
  • 6. Foreign Investment • Good IP regime a key factor • Companies who want to invest and compete need to know and work in environment where ideas and innovation are protected • Benefits • Scientific and technological progress • Knowledge transfer 03/24/25 Resource Person: Mrs. Pradnya Kashikar 6
  • 7. Local Investment • Local companies also benefit • Better position to negotiate with large companies • Cross-licensing, buy-out • Invest in new resources, R&D through licensing and royalties • Benefits both large and small companies • Lack of IP respect or protection => lack of incentive to invest in R&D 03/24/25 Resource Person: Mrs. Pradnya Kashikar 7
  • 8. Revenue • International software products • Benefits both local and international companies • Local industry earns more than international companies from products • Local industry involved in distribution channels, IT services market, support, maintenance, add-on, etc. 03/24/25 Resource Person: Mrs. Pradnya Kashikar 8
  • 9. Reducing Piracy • Significant benefits in reducing piracy rate • Studies show benefit of 10 point reduction • Asia – reduction of 10 points over 4 year create: • Additional 2 million jobs • Additional US 135 billion contribution to GDP • Of which 80% revenue to local vendors 03/24/25 Resource Person: Mrs. Pradnya Kashikar 9
  • 10. Future of Asia Pacific • Asian companies can become formidable international force • Must lead in innovation, and not mere followers or adopters of technology • Need IP protection to have incentive for people to devote time, effort, resources to innovate 03/24/25 Resource Person: Mrs. Pradnya Kashikar 10
  • 11. Copyright Protection: Software Models • Development Model • Business Model • Licensing Model 03/24/25 Resource Person: Mrs. Pradnya Kashikar 11
  • 12. Software Development Models • Open Source • Collaborative – different people, different places, no formal association – contributing elements towards final software • Not exclusively so today • Large companies also release in-house applications to community • Commercial Software • Usually developed by a commercial entity • Internal teams, though maybe over large geographical area or even international borders 03/24/25 Resource Person: Mrs. Pradnya Kashikar 12
  • 13. Software Business Models • Open Source • Not primarily on the software product • Revenue model is on supporting services and hardware • System integrators • Commercial Software • Focus is on the product • Revenue on customer buying products and its upgrades • Motivation for customer to buy next version if it is more innovative and has improved functionality 03/24/25 Resource Person: Mrs. Pradnya Kashikar 13
  • 14. Software Licensing Models • Open Source • Source code usually provided royalty free • Terms on redistribution, modification, addition stipulated, rather than requirement for fee to be paid • Commercial Software • Product sold or licensed to customer, In object code or executable form, for a fee • Source code may be made available to certain users through special licensing or other arrangement, but not to general users • Usually not to be copied or modified, except as provided in arrangement 03/24/25 Resource Person: Mrs. Pradnya Kashikar 14
  • 15. IPR and Software Development • Both models rely on IPR protection • Netfilter Project v Sitecom Germany GmbH case • Defendant used open source code within proprietary solution • Plaintiff initiated action to ask defendant to disclose proprietary solution • Plainitff had course of action because of copyright in code • Could not initiate action in other instances because no copyright 03/24/25 Resource Person: Mrs. Pradnya Kashikar 15
  • 16. Technical Issues • Cost • Security • Flexibility 03/24/25 Resource Person: Mrs. Pradnya Kashikar 16
  • 17. Implications – Piracy • Not a solution to software piracy problem • Software products not like other consumer-oriented commodity products • Different productivity gains; akin to engaging professional services • Where piracy rates are high, lower cost of software does not deal with lack of mindset to buy legitimate copies • Buyers of computers loaded with open source obtain pirated copies of commercial software to replace • Both open source and commercial software predicated on strong copyright protection 03/24/25 Resource Person: Mrs. Pradnya Kashikar 17
  • 18. Implications – Piracy • Developer’s perspective • Risk assessment on code base and code reuse • Inadvertently use code subject to GPL [General Public License]? • Risk of being sued by competitor • Piracy of a different form • Disregard of licensing terms • Incorporation into commercial products 03/24/25 Resource Person: Mrs. Pradnya Kashikar 18
  • 19. Resource Person: Mrs. Pradnya Kashikar 19 • Software is protected by: (1) Copyrights – rights enforceable by law and accorded to an artist, inventor/creator of an expression or creative works: literary, dramatic, musical, pictorial, graphics, artistic, audiovisual, architectural, or sound recording. • The protected works must have: • Tangible form(expression) • Originality • Fixation in a medium 03/24/25
  • 20. Resource Person: Mrs. Pradnya Kashikar 20 • Copyrights are now universally accepted • International enforcement conventions include: • WIPO- world intellectual property organization • UNESCO • UCC- universal copyright convention • WTO – World Trade Organization • Once a copyright expires the work goes in public domain 03/24/25
  • 21. Resource Person: Mrs. Pradnya Kashikar 21 • Public works include: • Non-copyrightable items( ideas, facts, schedules, names, etc..) • Copyrightable items whose copyrights have expired • Copyrightable works put in public domain by the author • Duration of copyrights: • Depends on country • In U.S.( before 1978, 75 years from date of issue, after 1978 lifetime of author plus 50 years) 03/24/25
  • 22. Resource Person: Mrs. Pradnya Kashikar 22 (2) Patents – protection of inventions and discoveries • What is protected must be: • New and useful • Improvement of any of the following: • Process, manufacturing( products that are not machines), machines(covering mechanism, mechanical products and composition) • Utility, Novelty, nonobvious, there must be no disclosure. • Protection duration in U.S. is 17 years 03/24/25
  • 23. Resource Person: Mrs. Pradnya Kashikar 23 • (3) Trade Secrets • Information that gives a company a competitive advantage over the others • No one specific definition of trade secrets • It’s a collection of information in a static format with a strategic importance • Duration is infinite if no disclosure 03/24/25
  • 24. Resource Person: Mrs. Pradnya Kashikar 24 • The following characterize trade secrets: • Extent the information is known outside the business • Extent of measures taken to protect the trade secrets • Value of information to the owner • Amount of money spent by owner to develop the information • Ease/difficulty of acquiring such information 03/24/25
  • 25. Resource Person: Mrs. Pradnya Kashikar 25 • (4) Trademarks – product identifying labels • Include: • Service marks • Certification marks • Collective marks • Characteristic of trademarks include( see page 138/139): • Arbitrary marks (say nothing but used for service) • Suggestive marks (symbols and writings) • Descriptive marks ( intended purposes) • General marks (unrelated and not suggestive) • Duration of trademarks in U.S. is 10 years 03/24/25
  • 26. Resource Person: Mrs. Pradnya Kashikar 26 • Trademarks are registered in U.S. if they: • Are in good taste for the public • Have no suggestive connotations to their origin • Are not symbols of any recognizable country • Do not use people’s likeness without permission 03/24/25
  • 27. Database and Data Protection 03/24/25 Resource Person: Mrs. Pradnya Kashikar 27
  • 28. Data Protection Act (1998) • What is the Data Protection Act (1998) and why was it created? • What are the eight principles of the Data Protection Act? • Data Protection Act: What rights do we have? • What is an Information Commissioner, Data Controller and Data Subject? • Are there any exemptions to the Data Protection Act? 03/24/25 Resource Person: Mrs. Pradnya Kashikar 28
  • 29. Data Protection Act (1998) What is it and why was it created? The Data Protection Act was developed to give protection and lay down the rules about how personal data can be used. It was created to protect individuals from misuse of this data. It governs the collection and processing of data by organisations and the individual rights to access the data if they wish. 03/24/25 Resource Person: Mrs. Pradnya Kashikar 29
  • 30. Data Protection Act (1998) What are the eight principles of it? 1. Data must be kept secure; 2. Data stored must be relevant; 3. Data stored must be kept no longer than necessary; 4. Data stored must be kept accurate and up-to-date; 5. Data must be obtained and processed lawfully; 6. Data must be processed within the data subject rights; 7. Data must be obtained and specified for lawful purposes; 8. Data must not be transferred to countries without adequate data protection laws. 03/24/25 Resource Person: Mrs. Pradnya Kashikar 30
  • 31. Data Protection Act (1998) What rights do we have as data subjects? • To be supplied with the data held about us; • To change incorrect data; • To prevent data being used about us if it will cause distress; • To stop data being used in attempts to sell us something; • To use the law to gain compensation. 03/24/25 Resource Person: Mrs. Pradnya Kashikar 31
  • 32. Data Protection Act (1998) What is an Information Commissioner, Data Controller and Data Subject? Information Commissioner: Person who has the power to enforce the Act. Data Controller: Person or Company that collects and keeps data about people. Data Subject: Person who has data about them stored outside their direct control. 03/24/25 Resource Person: Mrs. Pradnya Kashikar 32
  • 33. Data Protection Act (1998) Are there any exemptions to the Data Protection Act? • Any data held for National Security reasons e.g. MI5 • Police can access personal information in order to solve crimes. • The taxman can access personal information to ensure people pay their tax! • Any data held for domestic purposes at home e.g. birthday lists, address books. 03/24/25 Resource Person: Mrs. Pradnya Kashikar 33
  • 34. Computer Misuse Act (1990) • What is the Computer Misuse Act (1990) and why was it created? • What are the three principles of the Computer Misuse Act? 03/24/25 Resource Person: Mrs. Pradnya Kashikar 34
  • 35. Computer Misuse Act (1990) What is it and why was it created? The Computer Misuse Act (1990) was developed to cope with the problems of computer hackers and viruses. Hacker: Unauthorised user who attempts to or gains access to an information system Virus: A virus is a program written to cause mischief or damage to a computer system. 03/24/25 Resource Person: Mrs. Pradnya Kashikar 35
  • 36. Computer Misuse Act (1990) What are the three principles of the Act? 1. It is illegal to access unauthorised data e.g. Hacking. 2. It is illegal to access unauthorised data and intend to do it again e.g. Blackmail and fraud purposes. 3. It is illegal to access unauthorised data and amend it e.g. Planting Viruses and deleting files. 03/24/25 Resource Person: Mrs. Pradnya Kashikar 36
  • 37. Copyright, Design and Patents Act (1988) • Introduced to protect people who have created original pieces of work. • Books, Music, Films, Games, Applications. • 2 main purposes of the Act: • To ensure people are rewarded for their endeavours. • To give protection to the copyright holder if someone tries to steal their work. 03/24/25 Resource Person: Mrs. Pradnya Kashikar 37
  • 38. Copyright, Design and Patents Act (1988) • The Act protects a wide range of work… written and computer based. • Includes: • Copying Software; • Copying or Downloading music; • Copying images or photographs from the Web; • Copying text from web pages. 03/24/25 Resource Person: Mrs. Pradnya Kashikar 38
  • 39. 1. Personal data shall be processed fairly and lawfully 2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes. 3. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed. 4. Personal data shall be accurate and, where necessary, kept up to date. THE MORAL DIMENSIONS OF INFORMATION SYSTEMS Data Protection Act Principles 03/24/25 Resource Person: Mrs. Pradnya Kashikar 39
  • 40. 5. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. 6. Personal data shall be processed in accordance with the rights of data subjects under this Act. 7. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. 8. Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data. THE MORAL DIMENSIONS OF INFORMATION SYSTEMS Data Protection Act Principles 03/24/25 Resource Person: Mrs. Pradnya Kashikar 40
  • 41. • National Security • Crime, Taxation THE MORAL DIMENSIONS OF INFORMATION SYSTEMS Exemptions from the Data Protection Principles 03/24/25 Resource Person: Mrs. Pradnya Kashikar 41
  • 42. THE MORAL DIMENSIONS OF INFORMATION SYSTEMS Safe harbor: • Private self-regulating policy and enforcement mechanism that meets the objectives of government regulators but does not involve government regulation or enforcement. Example: U.S. corporations doing business in Europe must process their data in a “safe harbor” where the European rules of privacy are in force • “Safe harbor” status is granted by the EU after certification by a trusted third party, e.g. a recognized public account firm. 03/24/25 Resource Person: Mrs. Pradnya Kashikar 42
  • 43. Transborder dataflows • Flow of information across national borders • Much of this data involves personal information 03/24/25 Resource Person: Mrs. Pradnya Kashikar 43
  • 44. Examples of transborder personal data • An American buys a book from a bookstore in England • Information on the sale and payment cross two national borders • A Spaniard does contract work with a company in Canada • Information regarding payment crosses two national borders and earnings information is registered with two internal revenue agencies 03/24/25 Resource Person: Mrs. Pradnya Kashikar 44
  • 45. National Differences • Definition • US, Canada and France • Define protections of personal data in terms of privacy • Most of the European countries • Define it as data protection • Omnibus legislation versus sectoral rules 03/24/25 Resource Person: Mrs. Pradnya Kashikar 45
  • 46. More national differences • US • Privacy issues are driven by consumerism and free trade— stress on free flow of information and often cite the First Amendment for support • European and some other countries • Privacy issues and data protection policies protect fundamental rights of citizens—reflects belief that governments have a duty to protect privacy of citizens 03/24/25 Resource Person: Mrs. Pradnya Kashikar 46
  • 47. Definition:- • A safe harbor is a provision of a statue or a regulation that specifies that certain conduct will be deemed not to be violate a given rule • It is a set of a rules which decided by EU & US. • The US safe harbor principle were developed between 1998-2000. • It includes 7 principles. 03/24/25 Resource Person: Mrs. Pradnya Kashikar 47
  • 48. • Who manage these organization? -US Department of commerce -Federal Trade Commission 03/24/25 Resource Person: Mrs. Pradnya Kashikar 48
  • 49. Safe Harbor Principles • Notice: notify individuals about purpose; any third party disclosures; contact information • Choice: must provide opt-out as far as third party disclosure or incompatible use; opt-in for sensitive information • Onward Transfer (third party): assure that the third party also follows notice and choice 03/24/25 Resource Person: Mrs. Pradnya Kashikar 49
  • 50. Safe Harbor Principles • Access: individuals must have access to personal information and right to amend or delete if inaccurate • Security: reasonable precautions to protect information • Data Integrity: personal information must be relevant for the purpose it is to be used; ensure data is reliable for intended use • Enforcement: independent recourse mechanism 03/24/25 Resource Person: Mrs. Pradnya Kashikar 50
  • 51. Private Sector Enforcement • Must have dispute resolution system in place • Must remedy problems arising out of noncompliance • Remedies have to be strong enough to encourage compliance • Must include publicity for findings of noncompliance 03/24/25 Resource Person: Mrs. Pradnya Kashikar 51
  • 52. Government Enforcement • Federal Trade Commission • Counts as unfair and deceptive trade practice • Department of Transportation • Airlines and ticket agents 03/24/25 Resource Person: Mrs. Pradnya Kashikar 52
  • 53. List of companies • http://export.gov/safeharbor/ 03/24/25 Resource Person: Mrs. Pradnya Kashikar 53
  • 54. Protection of Semi-conductor Chips 03/24/25 Resource Person: Mrs. Pradnya Kashikar 54
  • 55. What is TRIP’s? • The Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS). • Is an international agreement administered by the World Trade Organization (WTO). • The TRIPS Agreement ... is to date the most comprehensive multilateral agreement on intellectual property • It was negotiated at the end of the Uruguay Round of the General Agreement on Tariffs and Trade (GATT) . • Introduced in 1994. 03/24/25 Resource Person: Mrs. Pradnya Kashikar 55
  • 56. • TRIP is available in three languages English,French,Spanish. • The areas of intellectual property that it covers are: 1. copyright and related rights (i.e. the rights of performers, producers of sound recordings and broadcasting organizations); 2.trademarks including service marks; 3.geographical indications including appellations of origin; 4.industrial designs; 5.patents including the protection of new varieties of plants; 6.the layout-designs of integrated circuits; 7.undisclosed information including trade secrets and test data. 03/24/25 Resource Person: Mrs. Pradnya Kashikar 56
  • 57. Features of TRIP… 1) Standard :- In respect of each of the main areas of intellectual property covered by the TRIPS Agreement, the Agreement sets out the minimum standards of protection to be provided by each Member. 2) Enforcement :- The second main set of provisions deals with domestic procedures and remedies for the enforcement of intellectual property rights. The Agreement lays down certain general principles applicable to all IPR enforcement procedures. 03/24/25 Resource Person: Mrs. Pradnya Kashikar 57
  • 58. 3) Dispute Settlement :- The Agreement makes disputes between WTO Members about the respect of the TRIPS obligations subject to the WTO's dispute settlement procedures. 03/24/25 Resource Person: Mrs. Pradnya Kashikar 58
  • 59. Members of TRIP Agreement • Two third members of WTO accepts the permanent changes made on 6 December 2005 related to patents and public health. • Albania (28 January 2009). • Australia (12 September 2007). • China (28 November 2007). • Egypt (18 April 2008). • Japan (31 August 2007). • United States (17 December 2005). • Switzerland (13 September 2006). • Sri Lanka (9 September 2015). 03/24/25 Resource Person: Mrs. Pradnya Kashikar 59
  • 60. The Requirements of TRIP’s • TRIPS requires member states to provide strong protection for intellectual property rights. • For Example – Copyright terms must extend at least 50 years, unless based on the life of the author. (Art. 12 and 14). Copyright must be granted automatically, and not based upon any "formality," such as registrations(Art. 9). Computer programs must be regarded as "literary works" under copyright law and receive the same terms of protection. 03/24/25 Resource Person: Mrs. Pradnya Kashikar 60
  • 61. Patents must be granted for "inventions" in all "fields of technology" provided they meet all other patentability requirements. Must be enforceable for at least 20 years (Art 33). 03/24/25 Resource Person: Mrs. Pradnya Kashikar 61
  • 62. Drawbacks of TRIP • Central Vigilance System. • No Amendments. • Not defined Patent,Copyright,TradeMark. • The resale rights depend upon Reciprocity. • There is no Proper Implementation of DSB orders. 03/24/25 Resource Person: Mrs. Pradnya Kashikar 62
  • 63. 63 Resource Person: Mrs. Pradnya Kashikar 03/24/25
  • 64. 64 Resource Person: Mrs. Pradnya Kashikar 03/24/25
  • 65. 65 Resource Person: Mrs. Pradnya Kashikar 03/24/25
  • 66. 66 Resource Person: Mrs. Pradnya Kashikar 03/24/25
  • 67. Need Threat of chip piracy Intel and Semiconductor Industry Association(SIA) took lead and filed a considerable complaint Hearings lead to enactment of SCPA(Semiconductor Chip Protection Act) in 1984 What protects semiconductor ICs then? • SCPA(US Legislation) • SICLDA(Indian Legislation) 67 Resource Person: Mrs. Pradnya Kashikar 03/24/25
  • 68. Semiconductor Chip Protection Act (SCPA) • Enactment by US congress in 1984 • Hybrid Law: Borrows from both patent and copyright • Acquisition of protection by registration • Fulfillment of obligations regarding Semiconductor IC topographies by TRIPS agreement • Suit is followed by other nations as well 68 Resource Person: Mrs. Pradnya Kashikar 03/24/25
  • 69. Semiconductor Integrated Chip Layout Design Act(SICLDA) Adapted by Indian legislation in 2000 Who can apply? • Creator of layout design/his legal representative Procedure for registration 1.Filing of application in writing 2.Acceptance of the application with acknowledgement 3.Advertisement of application 4.Issuing Certificate 69 Resource Person: Mrs. Pradnya Kashikar 03/24/25
  • 70. SICLDA(contd.) Duration of Registration:10 years Exclusions Exclusive Right to the Register Proprietor Registered User Assignment and Transmission Protection against Infringement Innocent Infringement is allowed. Adjudicating Authority 70 Resource Person: Mrs. Pradnya Kashikar 03/24/25
  • 71. Highlights of Indian Legislation Protection of semiconductor integrated circuits layout and designs by a registration process. A mechanism for distinguishing which layout designs can be protected rules to prohibit registration of layout designs which are not original or which have been commercially exploited. Protection of 10 years period Provisions regarding infringement and evidence of validity are mentioned. 71 Resource Person: Mrs. Pradnya Kashikar 03/24/25
  • 72. Highlights of Indian Legislation(contd.) Provisions for determining payment of royalty for registered layout designs in case of innocent or unintentional infringement Penalties in the form of imprisonment and fine are imposed for willful infringement and other offences in the Act. The Registrar is appointed for the purpose of administration and the Appellate Board is established for facilitating the legal objective. 72 Resource Person: Mrs. Pradnya Kashikar 03/24/25
  • 73. CONCLUSION 73 Resource Person: Mrs. Pradnya Kashikar 03/24/25
  • 74. Domain Name Protection 03/24/25 Resource Person: Mrs. Pradnya Kashikar 74
  • 75. Domain Names A Domain name is a web address. For example: www.marksandspencer.com www.amazon.co.uk www.ebay.co.uk 03/24/25 Resource Person: Mrs. Pradnya Kashikar 75
  • 76. Domain Names Domain names are in fact IP addresses. These are computer addresses. 212.219.32.8 Is the Law School’s IP address. The English translation of these numbers can be very lucrative. 03/24/25 Resource Person: Mrs. Pradnya Kashikar 76
  • 77. Cybersquatting Cybersquatting is a term that is used to describe a person who registers a domain name and then offers it for sale to the true owner. There has been some litigation on this issue. 03/24/25 Resource Person: Mrs. Pradnya Kashikar 77
  • 78. Cyberlaw: Jurisdictional Issues • Existing internet law is vague or does not completely cover such issues as the protection of domain names, taxes, jurisdiction in cross-border transactions, and contractual issues • The European Union, the U.S. and many other countries are drafting legislation to address the myriad legal questions not clearly addressed by current law • Laws being considered deal with Cybersquatters—those who buy and register descriptive nouns, geographic names, ethnic groups, pharmaceutical substances and other similar descriptors and hold them until they are sold at an inflated price • Another issue in e-commerce concerns the collection of taxes on sale of products, i.e., when taxes should be collected, where they should be collected, and by whom, are all issues under consideration by countries around the world 03/24/25 Resource Person: Mrs. Pradnya Kashikar 78
  • 79. Domain Name System (DNS) • Basically, DNS is a global addressing system • DNS allows users to go to a specific website by entering its corresponding domain name • DNS locates and translates domain names into IP addresses 03/24/25 Resource Person: Mrs. Pradnya Kashikar 79
  • 80. Components of Domain Names Second-level domain www.inta.org Top-level domain 03/24/25 Resource Person: Mrs. Pradnya Kashikar 80
  • 81. Components of Domain Names: Top-Level Domains • Highest level in the DNS hierarchy • Generic Top-Level Domains (gTLDs) • Examples: .com, .net, .org • Also, gTLDs for business or interest groups (e.g., .gov for the U.S. government, etc.) • NEW gTLDs (e.g., .brand, .community, .geographical area) • Country-Code Top-Level Domains (ccTLDs) • Examples: .au for Australia, .mx for Mexico • Internationalized Domain Names (IDNs) • Contain local language characters such as accents and may include non-Latin scripts • Examples: 香港 (Hong Kong), рф (Russian Federation) 03/24/25 Resource Person: Mrs. Pradnya Kashikar 81
  • 82. Components of Domain Names: Second-Level Domains • Second-level domain names: • Follows “www.” and precedes the top-level domain name • Chosen by registrant • Must be: (1) unique term not previously used as a second-level domain name, and (2) registered 03/24/25 Resource Person: Mrs. Pradnya Kashikar 82
  • 83. New gTLD Names • Examples of new gTLD names: • by brand (.amazon, .dunlop), music and arts community (.theater, .band), cause (.eco, .charity), geographic/cultural area (.nyc, .irish), etc. • Companies and organizations will be able to create and operate a registry business for the new gTLD • The use of non-Latin characters (such as Cyrillic, Arabic, Chinese, etc.) will also be allowed in gTLDs • The initial application process closed on May 30, 2012 • The time period for a second round of applications has not yet been established, but it will likely be at least a couple of years after the close of the initial round of applications 03/24/25 Resource Person: Mrs. Pradnya Kashikar 83
  • 84. New gTLD Names: Trademark Owners’ Remedies • The World Intellectual Property Organization (WIPO) is the exclusive provider of dispute resolution services for trademark-based “Legal Rights Objections” for the new gTLDs (More info: http://www.wipo.int/amc/en/domains/newgtld/) 03/24/25 Resource Person: Mrs. Pradnya Kashikar 84
  • 85. Timeline for New gTLDs For the most up-to-date information, see: • http://www.inta.org/Advocacy/Pages/gTLDs.aspx • http://newgtlds.icann.org/en/applicants/agb 03/24/25 Resource Person: Mrs. Pradnya Kashikar 85
  • 86. How Are Domain Names Registered? • Internet Corporation for Assigned Names and Numbers (ICANN) manages domain name system (More info: http://www.icann.org/) • ICANN-Accredited Registrars handle the actual registration of gTLDs • National Registry or Local Registrars handle the actual registration of ccTLDs 03/24/25 Resource Person: Mrs. Pradnya Kashikar 86
  • 87. Domain Name Disputes Cybersquatting refers to when a party registers, without permission, a domain name that is confusingly similar to a third-party trademark with the intention of seeking to reap some type of commercial or financial benefit, often in an effort to block the trademark owner from using the domain until the owner agrees to pay an exaggerated sum for the domain. 03/24/25 Resource Person: Mrs. Pradnya Kashikar 87
  • 88. Domain Name Disputes • Typosquatting • Domain Name Testing 03/24/25 Resource Person: Mrs. Pradnya Kashikar 88
  • 89. Reactions to Cybersquatting • Uniform Domain-Name Dispute-Resolution Policy (UDRP): http://www.icann.org/en/help/dndr/udrp • Anticybersquatting Consumer Protection Act 1999 (ACPA): http://www.law.cornell.edu/uscode/text/15/1125 03/24/25 Resource Person: Mrs. Pradnya Kashikar 89
  • 90. Uniform Domain-Name Dispute-Resolution Policy (UDRP) • International arbitration process for resolution of domain name disputes adopted by ICANN • Incorporated into domain name registration agreements of accredited registrars • Also, registrants make certain representations regarding their domain names (e.g., domain name registration will not infringe third-party rights, etc.) • Only administrative alternative to going to courts 03/24/25 Resource Person: Mrs. Pradnya Kashikar 90
  • 91. UDRP Service Providers • World Intellectual Property Organization (WIPO) • National Arbitration Forum (NAF) • Asian Domain Name Dispute Resolution Centre • The Czech Arbitration Court Arbitration Center for Internet Disputes (More info: http://www.icann.org/en/help/dndr/udrp/providers) 03/24/25 Resource Person: Mrs. Pradnya Kashikar 91
  • 92. Other Jurisdictions • Many countries have their own policies and procedures • Examples: Mexico —Domain Name Dispute Resolution Policy for .mx (LDRP): http://www.registry.mx/jsf/static_content/domain/policies_second.jsf Israel—Procedures for Alternative Dispute Resolution under the .il ccTLD by Dispute Resolution Panels (IL-DRP): http://www.isoc.org.il/domains/ildrp.html (More Info: WIPO Arbitration & Mediation Center ccTLD Database: http://www.wipo.int/amc/en/domains/cctld_db/) 03/24/25 Resource Person: Mrs. Pradnya Kashikar 92
  • 93. • Patent licensing: an important tool for e-businesses Source: Idea Buyer
  • 94. What are the challenges raised by the impact of e-commerce? 03/24/25 Resource Person: Mrs. Pradnya Kashikar 94
  • 95. • Protection of software: different IP rights may protect different aspects of software Source: Espaço da Vaninha Copyright: object code, literal components Patent: new technical contributions Designs: graphic user interfaces, icons Trade secrets: source code
  • 96. • Online content distribution  Ease of upload, download and copying -» illegal uploading and downloading of copyright materials
  • 97. • As an e-commerce business:  Protect your IP on the Internet  Never distribute or permit downloads of content which does not belong to your company  Implement programs, policies and guidelines which ensure that your employees understand IP related matters. 03/24/25 Resource Person: Mrs. Pradnya Kashikar 97
  • 98. • Domain name issues  DN must be available  Conflicts of domain name with third parties’ trademarks or personality rights 03/24/25 Resource Person: Mrs. Pradnya Kashikar 98
  • 99. Technical tools/ Software - Check license-based Terms&Conditions - Get permissions Copyrighted works - Finding info from CMOs - Moral rights aspects - Specifics of using photos - Public domain material/freely available material Trademarks - Metatagging, linking, framing - Marketing and advertising Personal indicia - Privacy rights - Publicity rights 03/24/25 Resource Person: Mrs. Pradnya Kashikar 99
  • 100. • Domain names vs. trademarks Domain Names Trademarks Internationally available National/Regional IP rights One domain name within one first level domain Possible coexistence of similar or identical TMs (eg. different classes) Registration on first-comes first- serves basis without examination Examination (formal and/or substantive) Private contract with a registrar Registration by state/regional authorities Less expensive and quicker More expensive and longer
  • 101. • Uniform Domain Name Dispute Resolution Policy (UDRP)  UDRP Rules adopted in 1999  Reasons: - Protection of trademark owners and legitimate domain name registrants - Effective fight and prevention against cybersquatting (with less cost, shorter duration, etc.)  Limited to cases of abusive registration of domain names  More on UDRP procedure: http://www.wipo.int/amc/en/domains/ 03/24/25 Resource Person: Mrs. Pradnya Kashikar 101
  • 102. • UDRP does not cover:  Disputes regarding registrations which violate business (trade) names, geographical indications or personality rights  Situations which per se do not fall under the definition of ‘abusive registration’ under UDRP 03/24/25 Resource Person: Mrs. Pradnya Kashikar 102
  • 103. • Protected elements of a website New technological systems Search engines Other technical internet tools Software Database Website design Website content Business names, domain names Product names, logos, other signs Computer-generated graphic symbols, screen displays, GUIs, webpages Confidential graphics Source code, object code, algorithms Data flow charts, database contents, etc 03/24/25 Resource Person: Mrs. Pradnya Kashikar 103
  • 104. • Types of protection New technological systems Search engines Other technical internet tools Software Database Website design Website content Business names, domain names Product names, logos, other signs Computer-generated graphic symbols, screen displays, GUIs, webpages Confidential graphics Source code, object code, algorithms Data flow charts, database contents, etc Patents/utility models Copyright Design Sui generis/ database laws Trademarks Trade secrets 03/24/25 Resource Person: Mrs. Pradnya Kashikar 104
  • 105. 1 - To protect IP rights By registering trademarks By registering domain names By registering website and copyright (in case such possibility is provided) Patenting online business methods (in countries where it is available) 2 - To let people know that the content is protected By using symbols: ©, ®, etc By using watermarks for copyright content By giving notices that website or business method is patented  Precautionary measures
  • 106. 3 - To let people know what use they can make of the content What they can do with the page Who to contact to get a copyright clearance related to website components 4 - To control access and use of website content By using online agreements to allow access By using encryption (keys, etc.) By using access control & conditional access systems  Precautionary measures (cont) 5 – To detect infringements on website By taking random snippets of text from website and searching for the snippets using search engines By using ‘spider programs’ to detect illegal use
  • 107. • Taking action against infringers - steps 1 - Make screen shots or prints of relevant pages 2 - Print the source code from the infringing website 3 - Assure that you can prove your prior ownership over website content and its originality 4 - Send ‘cease & desist’ letter to the owner of infringing website 5 - If no response received, send: (a) a notice about infringement to any search engine and (b) a request to ISP with a demand to remove the infringing site
  • 108. • In short… • If you want to use protected content in your website (art works, photos, paintings, etc.), you need to get permission from their creators or owners • Websites which collect, handle or disclose personal information of their users should comply with the national privacy laws of the country from which they are operating 03/24/25 Resource Person: Mrs. Pradnya Kashikar 108
  • 109. • In short… • An outside contractor will usually own the right in the website unless contractually agreed otherwise • Domain names are unique: two companies can own and use the same trademark, but only one company can own a particular domain name • In most countries, a registration of someone else’s trademark as a domain name is a violation of trademark rights 03/24/25 Resource Person: Mrs. Pradnya Kashikar 109
  • 110. • In short… • Domain names are registered on a first-come, first-serve basis • UDRP is an administrative procedure to solve disputes between trademarks and domain names in case of abusive registration 03/24/25 Resource Person: Mrs. Pradnya Kashikar 110

Editor's Notes

  • #86: Since 1999, Internet Corporation for Assigned Names and Numbers ("ICANN") has been responsible for managing the domain name system. It is responsible for facilitating the technical, managerial and policy decisions on the Internet. Actual registration of domain names is delegated to various accredited registrars. Individual countries control their respective ccTLDs and establish their own policies for registration and use. After the registrant has provided contact and technical information to the chosen registrar, the registrar verifies that the domain name is available and then submits the technical information to a central directory known as the "registry." This registry provides other computers on the Internet the necessary information to send you email or locate your website. When a domain name is registered, an entry is added to a directory of all the domain names and their corresponding computers on the Internet.
  • #87: There are several types of domain name disputes that involve bad faith. The most common type of dispute—both in terms of relevance to abuse of trademarks and in terms of prevalence on the Internet—is cybersquatting. Cybersquatters exploit the first-come, first-served nature of the domain name registration system to register names of trademarks, famous people or businesses with which they have no connection. Some cybersquatters then offer to sell the domain names directly to the company or person involved, at prices exceeding the cost of registration. In other cases, the registrant uses the domain to host a website that is, for instance, filled with advertising links or content competitive with the trademark owner.
  • #88: Although this presentation will focus on cybersquatting, it should be noted that there are other types of abuse related to domain names. Typosquatting Registration of a domain name that constitutes an intentional misspelling of a third-party trademark with a view to securing financial or commercial benefit. If a user accidentally enters an incorrect website address, he or she may be led to an alternative website owned by a cybersquatter (e.g., registration of cocacolla.com in an attempt to capture traffic from cocacola.com). Domain Name Tasting Following the initial registration of a domain name, there is a five-day grace period during which the registration may be deleted. The term “domain name tasting” refers to the practice whereby registrants use the five-day grace period to test the profitability of domains. The registrants conduct a cost-benefit analysis to determine whether they will derive income from advertisements placed on the domain's website. If the amount of income generated by traffic to the website exceeds the annual registration fee, the registrant will keep the domain name. Otherwise, the registrant will cancel the registration. As a result of domain name tasting, ICANN imposed penalties that would ensure that any group that performed an excessive number of these premature domain name cancellations wound up with a substantial bill. ICANN announced in August 2009 that its actions essentially eliminated domain name tasting.
  • #90: In 2001, ICANN devised the Uniform Domain-Name Dispute-Resolution Policy (UDRP). The UDRP is an international arbitration process for the resolution of domain name disputes. The UDRP permits trademark holders to seek the transfer or cancellation of domain names that they believe infringe on their trademark rights, without resorting to litigation. All accredited registrars now use the UDRP. The dispute resolution procedure is incorporated into the agreement between the registrar and domain name registrant at the registration stage. A business or person who believes that a name or trademark is being used by a cybersquatter or another party who lacks the rights to the domain name may have grounds to initiate a proceeding under the UDRP.
  • #91: ICANN provides a list of approved service providers for Uniform Domain-Name Dispute-Resolution Policy. When choosing an appropriate dispute resolution provider, it is important to consider factors such as the location, cost, language skills, the type of domain at issue, and availability of each provider.
  • #92: NIC-Mexico (the Network Information Center in Mexico) devised its own policy for the administration and registration of .mx domain names and, as of December 1, 2000, enacted the General Domain Name Policies. The Israeli domain name dispute resolution policy is an alternative dispute resolution procedure intended to provide expedited resolution to disputes regarding the allocation of domain names under the .il ccTLD.