Information Technology Fundamentals CCIT4085 PDF
Document Details
Uploaded by PoignantSynecdoche4871
Tags
Summary
This document provides a general overview of information technology fundamentals, focusing on intellectual property rights, personal data privacy, and cyberspace ethics. It covers topics such as copyrights, patents, trademarks, trade secrets, and the six data protection principles. It also addresses ethical issues of the internet, exploring whether technology is neutral.
Full Transcript
CCIT4085 Information Technology Fundamentals 2.3 Plagiarism & Intellectual Property (IP) Rights, Personal Data Privacy, Cyberspace Ethics 24-25s1 Plagiarism & Intellectual Property (IP) Rights, Personal Data Privac...
CCIT4085 Information Technology Fundamentals 2.3 Plagiarism & Intellectual Property (IP) Rights, Personal Data Privacy, Cyberspace Ethics 24-25s1 Plagiarism & Intellectual Property (IP) Rights, Personal Data Privacy, Cyberspace Ethics ▪ IP Rights ▪ Copyrights, Patents, Trademarks, Trade Secret ▪ Personal Data Privacy ▪ 6 Data Privacy Principles ▪ Ethical Issues of the Internet ▪ Is technology neutral? 2 What is Intellectual Property (IP)? knowledge/concept ▪ Property – Something that can be owned buy a consumer good /product solid object 1) ▪ Physical property – ▪ Something tangible, e.g., car, land, objects… ▪ Can easily identify the owner Invoice/receipt/registration ▪ Can easily determine if wrongfully taken since only one person can possess it at any one time bought a car lease or borrow with a car license (by one pe a flat (registration) legal certificate 3 What is Intellectual Property (IP)? knowledge from the fields 2)▪ Intellectual property – or any subjects ▪ Non-physical products – intangible - created through intellectual efforts ▪ Ownerships not so easily established; and many people can possess it at the same time designs/drawings/paintings ▪ May not know even if someone has stolen it, or made use of it without permissionuntil it publishes to the public 4 Examples of Intellectual Properties ▪ Many different types: drama ▪ Literary works – books, poems, plays, … ▪ Arts – music, movies, paintings, … ▪ Designs – drawings of machinery, furniture, graphic designs, e.g. logo, … ▪ Processes – ways of doing things, e.g. for manufacturing, … ▪ Combinations of materials – drugs, recipes, e.g. ingredients of XO sauce ▪ … 5 Protection of Intellectual Properties 1)▪ Protection of physical properties ▪ Is about protecting the property itself – e.g. cannot be used without permission pay for renting something 2) ▪ Protection of Intellectual properties ▪ Is not about protecting the property itself, but is about protecting the opportunity to profit from the intellectual property make money/profit/benefit 6 Forms of IP Protection Summary for 4 forms of IP ▪ Four forms of IP Protection: creations 1. Patents – for inventions of new and useful processes, machines, composition of matters, and any improvement of existing ones 2. Copyrights - protects creativity expressed in a “recorded form” but not mere ideas textual expression/ information 3. Trademarks - a recognizable sign, design or expressions which identifies products or services group 4. Trade Secrets – a formula, practice, commercial method, or compilation of information not generally known or reasonably ascertainable by others secret established drugs/formation formula of cola 7 1 For IP protection ▪ Inventions or discoveries of new and useful: ▪ Process ▪ Machine ▪ Manufacture / composition of matter workable/practical ▪ Improvement smartphone functional designs ▪ Offers protection in areas of applied technology, not abstract conceptual entities such as theories, equations, etc. 8 ▪ Must satisfy tests of: ▪ Novelty – new relative to existing technology ▪ Originality– the applicant is the actual inventor represent a corporation ▪ Patent is granted in the name of a person, but a corporate entity may own the rights practical ▪ Utility– invention is useful, does what it claims right to the society ▪ The purpose must be legal and moral drug/medicine(positive impact) ▪ Non-obviousness– the invention is not obvious to someone with ‘ordinary’ skill complicated to someone obey law, guidelines for right behaviour 9 provide documentation ▪ The inventor must file a patent application with the Patent and Trademark Office ▪ By country ▪ Date of first invention vs. date of first filing complete/total rights ▪ Patent holder has exclusive rights to the patented invention for a period of time ▪ The patent holder can grant rights to others to use, make lease or sell the patented invention in return for royalty fees license fee ▪ After the period of the patent ends (normally 15-20 years), the invention passes into public domain LEGO non-copyright item diff. shapes, sizes puzzle design 10 Is Patents a useful system? make profits Can be viewed as a social contract between inventors and society experience new tech. improve living standard ▪ The inventor makes full disclosure of his work and the society gives him/her a time-limited monopoly on the use of the invention cannot use without permission competitors ▪ Others can learn from the invention, which may lead to further inventions and development in this area competitive edge/advantage ▪ In this sense, patents can promote the progress of technology and society gradual change negative work more chances to sell such patents The downside is that inventors try to write patents as broadly as possible in order to cover all related products 11 2 Copyrights literary work ▪ Protection originally covered books, maps, and charts novels hand crafts Arts ▪ Later extended to engravings, prints, musical compositions, photographs, motion pictures, sound recordings, and software ▪ Must satisfy test for originality – the work must be original with the designer author and ▪ Lasts for life of author + 50 years 12 Fixed in a tangible medium of expression. Not in the Copyrights to the public sense of a number of physical copies and for sale ▪ An eligible work has copyright protection the moment it is finished and published – with a clearly visible copyright notice and symbol © ▪ Protects the expression of an idea, rather than the idea itself text or graphics copy ▪ E.g., It’s OK if someone reads the copyrighted work and makes use of the idea; but he is not allowed to re-produce the idea in that particular expression publish and sell as original work ▪ Can be registered with the Copyright Office, but not a requirement ▪ Ref: https://www.ip.gov.hk/en/types-of- ip/copyright/index.html 13 Is Copyrights useful protection for software? programmers provide open source codes/programs online prevent/avoid ▪ Software can be easily modified to circumvent any copyright protection new version/new related product pdf convertor GUI ▪ “look and feel” copyright – refers to the user interface of the software, i.e., the design, graphics, interactions,… ▪ Case - Apple v. Microsoft OS ▪ Apple alleged that Microsoft Windows copied the look and feel of Mackintosh difficult to prove such outlook Apple lost the case 14 3 Trademarks ▪ A recognizable sign, design, or expression which identifies products or services of a particular source. companies ▪ Trademark owner can be an individual, business organization, or any legal entity. ▪ The symbols and ® can be used to indicate trademarks; where ® is for registered trademarks only. ▪ Ref: https://www.ip.gov.hk/en/types-of-ip/trade-marks/index.html and review the following web pages: ▪ Examples of trademarks ▪ Registering a trademark ▪ Choosing a trademark ▪ Duration of trademarks 15 4 Trade Secrets ▪ Comprise formulas, practices, processes, designs, instruments, patterns, or compilations of information. ▪ A trade secret is information that: ▪ is not generally known to the public; ▪ confers economic benefit on its holder because the information is not publicly known; and ▪ where the holder makes reasonable efforts to maintain its secrecy. duration long time ▪ Protection of trade secrets can extend indefinitely, it therefore may provide an advantage over patent protection and other registered intellectual property rights, which last only for a specific duration. ▪ E.g. The Coca-Cola Company has been effective in protecting the Coca-Cola formula for many more years than the 20 years of protection that a patent would have provided. ▪ Ref: https://www.ip.gov.hk/en/types-of-ip/trade-secrets-know- how/index.html 16 Discussion Enforcing IP rights can be difficult ▪ Have the following violated the IP rights of Apple? Apple company logo shape, colour size No (a) (b) Yes 17 Plagiarism education/research/publisher/social networking copy and ▪ Plagiarism is the "wrongful appropriation" and "stealing and use publication" of another author's "language, thoughts, ideas, or expressions" and the representation of them as one's own original work – Wikipedia ▪ It is OK to make use of other authors’ writings, as long as references are made properly citations => source of info. (Other one's work) ▪ More information - https://tl.hku.hk/plagiarism/ 18 Privacy info. explosion=>massive amount of info exchange/receive/collect Privacy is becoming a big issue in the information age, mainly due to: ▪ Increased capability of IT to collect, process, disseminate all sorts of information powerful processing /big data analytics ▪ Information is increasingly treated as a commodity to be bought and sold product/good including personal info 19 HK’s Personal Data Privacy Ordinance Refer to The Ordinance at a Glance at the Privacy Commissioner for Personal Data (PCPD) website ▪ https://www.pcpd.org.hk/english/data_privacy_law/ordinance_at_a_Glan ce/ordinance.html 20 Personal Data def. ▪ Two criteria: 1. The information which relates to a living person and can be used to identify that person. (identity) 2. It exists in a form in which access or processing is practicable. ▪ Examples: names, phone numbers, addresses, identity card numbers, photos, medical records and employment records 21 Six Data Protection Principles (DPPs) e.g. JUPAS university degree ▪ DPP1 – Purpose and Manner of Collection offer ▪ Personal data must be collected in a lawful and fair way, for a purpose directly related to a function /activity of the data user. ▪ Data subjects must be notified of the purpose and the classes of persons to whom the data may be transferred. admission office ▪ Data collected should be necessary but not excessive. Human no extra data resources is needed ▪ DPP2- Accuracy and Duration of Retention ▪ Practicable steps shall be taken to ensure personal data is accurate and not kept longer than is necessary to fulfil the purpose for which it is used. 1 year 22 Six Data Protection Principles (DPPs) ▪ DPP3 – Use of Data ▪ Personal data must be used for the purpose for which the data is collected or for a directly related purpose, unless voluntary and explicit consent with a new purpose is obtained from the data subject. notify/inform with approval ▪ DPP4 - Data Security ▪ A data user needs to take practicable steps to safeguard personal data from unauthorised or accidental access, processing , erasure, loss or use. password 23 Six Data Protection Principles (DPPs) statement to the public ▪ DPP5 - Openness and Transparency ▪ A data user must take practicable steps to make personal data policies and practices known to the public regarding the types of personal data it holds and how the data is used. online registration with ▪ DPP6 - Access and Correction login for updating info. ▪ A data subject must be given access to his/her personal data and allowed to make corrections if it is inaccurate. 24 Privacy vs. Public Rights to Know (extra) pubic interests Does Personal Data Privacy override all other rights? Case for discussion: health/hygiene public safety Under exceptional situations, such as when public interests, health issues, are at stake, then the authority has the rights to request personal data, overriding the personal data privacy rights. 25 Discussion ▪ MacDonalds wants to implement a fingerprint sign-in system to keep track of employees work records. monitor ▪ Which DPPs are most relevant for consideration in this case? 1, 3, and 5 “Employers must inform their employees about the reasons for collecting employees’ fingerprints; and must collect it in a legal and fair way. Employees must agree with this freely and willingly.” - PCPD 26 right or wrong behaviors of an activity/issue Ethical Issues of the Internet online (www) Are there unique ethical issues concerning the Internet? Two school of thoughts: 1. There is really nothing new or unique in the Internet; neutral the ethical issues are essentially the same. overstated 2. The use of technology has greatly exaggerated traditional problems and issues, particularly in scale and scope. Hence there are new issues to deal with. big data analytics info can be shared/published easily/quickly justification 27 Ethical Issues of the Internet ▪ Is technology neutral? An analogy - “Guns don’t kill people. People kill people.” Two opposite viewpoints: neutral Guns are neither good nor bad. Hence guns are neutral in the sense that it does not promote or worsen violence, when comparing to other tools or technologies; or Guns are “valenced towards violence” – the mere -ve presence of a gun in a situation raises the level of violence not use appropriately negative impact 28 Discussion Virtual environment (not real identify) real identity with no responsibility with responsibility Internet People People behave the behave same as in differently the from the physical physical world world 29 Ethical Issues of the Internet ▪ Many existing issues / problems in the physical world are greatly exaggerated or ‘amplified’ in the internet world, e.g. ▪ Cyber-bullying ▪ Fake news ▪ Frauds / Financial scams ▪ False identities ▪ Pornography ▪ Hate speeches / extremism ▪ … beware of info (true or false) Need to be vigilant, and behave responsibly in the Internet world; just like in the physical world. 30