Patents PDF
Document Details
Uploaded by ModestBeryllium
CIT College of Information Technology
Tags
Summary
This document provides an overview of patents, trade secrets, and various intellectual property issues. It covers topics such as software patents and discusses examples of trade secrets. Additionally, it explores plagiarism, reverse engineering, and open-source code.
Full Transcript
Patents Patent - a patent is a grant of a property right issued by the United States Patent and Trademark Office (USPTO) to an inventor. Republic Act No. 8293 - otherwise known as The Intellectual Property Code of the Philippines lays down the rules and regulations that grant, and enforce patents...
Patents Patent - a patent is a grant of a property right issued by the United States Patent and Trademark Office (USPTO) to an inventor. Republic Act No. 8293 - otherwise known as The Intellectual Property Code of the Philippines lays down the rules and regulations that grant, and enforce patents in the Philippines. - granted by IPOPHL (Intellectual Property of the Philippines Copyright vs Patent - unlike copyright, patent prevents independent creation as well as copying. Software Patent - claim as its invention some features or process embodied in instructions executed by a computer. Software patent cases: Oracle vs Google (Java programming language) Apple vs Samsung (Apple was awarded $1.1 billion in damages) Trade Secrets - Trade secrets are secret practices and processes that give a company a competitive advantage over its competitors. - U.S. trade secrets are protected by the Economics Espionage Act of 1996. Examples: Coca-Cola's Secret Recipe McDonald’s Special Sauce Google’s Algorithm Nestle’s Coffee Kentucky Fried Chicken’s Recipe Pepsi’s Recipe Apple’s Product Design Toyota’s Manufacturing Process Nike’s Shoe Design L’Oreal Skincare Formula Hershey’s Chocolate-Making Process Pepsodent Toothpaste Intel’s Chip Porsche’s Engine Key Intellectual Property Issues 1. Plagiarism - act of stealing someone’s ideas or words and passing them off as one’s own 2. Reverse Engineering - process of taking something apart in order to understand it, build a copy of it and improve it. Ex. Microsoft vs Apple Macintosh 3. Open Source Code - any program whose source is made available for use or modification, as users or other developers see fit 4. Competitive Intelligence - legally obtained information that is gathered to help a company gain an advantage over its rivals 5. Trademark Infringement - trademark is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company’s products from another’s 6. Cybersquatting - act of registering or using a domain name to profit from a trademark, corporate name, or personal name of an individual Fair Use - permits a party to use a copyrighted work without the copyright owner's permission for purposes such as criticism, comment, news reporting, teaching, scholarship, or research. LEGAL ISSUES in COMPUTING SOFTWARE PIRACY -Illegal copying, distribution, or use of software. -EULA (end user license agreement) -Shrink wrap license (you can install original copy of software and you can make a backup) -Shareware- is a type of proprietary software that is initially shared by the owner for trial use at little or no cost. -Freeware- copyrighted but freely distributed at no charge Types of software piracy: 1. Soft lifting (borrow and install from colleague) 2. Client-server overuse (install more copies than you have in license) 3. Hard-disk loading (install and sell unauthorized copies of software) 4. Counterfeiting (duplicating and selling copyrighted programs) 5. Online piracy (downloading illegal software from network) Hacking It is a form of planning or a technique that people use to get access to various unauthorized systems, software, and devices. Hackers/crackers Hackers: These are people who hack devices and systems with good intentions. Crackers: These are people who hack a system by breaking into it and violating it with some bad intentions. Types of hackers: 1. White hat hackers (Ethical) 6. Blue hat hackers (employed) 2. Script kiddies hackers (buys) 7. Red hat hackers (heroes) 3. Black hat hackers (non 8. Malicious insiders (infiltrate) ethical) 9. State-sponsored hackers 4. Green hat hackers (from (sponsored) scratch) 10. Hacktivists (politics) 5. Gray hat hackers (in between) Virus - an umbrella term for many types of malicious code. - a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. - “A true virus does not spread itself from computer to computer.” Types of Virus: 1. Resident virus 6. Web scripting 2. Multipartite virus virus 3. Direct action 7. File infector 4. Browser hijacker 8. Network Virus 5. Overwrite virus 9. Boot Sector Virus Common questions about Virus: 1. Is Trojan a virus? 2.Is a worm a virus? 3.Is ransomware a virus? 4.Is rootkit a virus? 5.Is a software bug a virus? Common Signs of Computer Viruses 1. Speed of system 2. Pop-up windows 3. Programs self-executing 4. Accounts being logged out 5. Crashing of the device 6. Mass emails being sent from your email account 7. Changes to your homepage Accountability, responsibility, liability Accountability: is what happens after a situation has occurred. Responsibility: 2 conditions (causal and mental) Liability: those in the best position to fix the problem are actually responsible for the problem. ORGANIZATIONAL CONTEXT Core Learning Outcomes: 1. Outline the basic parts of typical IT environment. 2. Explain how IT must support business processes. 3. Identify how an IT professional maintains their professional behavior. 4. Explain how an organizational culture can affect IT. A. Business Process Definition: - series or steps performed by a group of stakeholders to achieve a concrete goal. Key reasons to have a well-defined business process Identify what tasks are important to your larger business goals Improve efficiency Streamline communication between people/functions/ departments Set approvals to ensure accountability and an optimum use of resources Prevent chaos from creeping into your day-to-day operations Standardize a set of procedures to complete tasks that really matter to your business Business Process in Companies 1. Finance and Inventory 2. Material Management 3. Human Resources 4. Sales and Distribution 5. Production 6. Management Information System Example of Business Process: As an example, let's consider the hiring process of an HR department. Right from posting the job opening to onboarding the employee, there are multiple steps involved in the process. Although this can vary from organization to organization, a simple workflow might look like this: The HR executive posts the job update Multiple candidates apply in a portal The HR executive screens the candidates and filters the best-fits The selected candidates are called for the next stages of the recruitment The right candidate is chosen at the last stage of the recruitment Salary and policy negotiations take place The offer letter is sent and the candidate accepts This is then followed by a long employee onboarding process. B. IT Environment IT Environment - an integrated collection of technology components that serves the needs of its users and the owner of the resulting system. System: a set of things that work together as part of a greater mechanism. Ownership and Operation - Owner and operator need to be the same. Owner : ✓the one who pays the bill ✓the one who is responsible legally ✓the one with final authority ✓the one who ultimately should achieve some benefit IT Environment Components * Computing platforms * Applications/ Apps * Connectivity (networking) ◦ - wireless (Wi-Fi, 3G/4G data services, Bluetooth) ◦ - Wired (twisted copper pairs, fiber optic) ◦ - Personal (ex. Bluetooth) ◦ - Local (ex. Ethernet) ◦ - Distant (Wide-area - ex. DSL) IT Environment Dimensions * Some ways to measure size: - Geography - Number of computing platforms - Variety of technology - Footprint - Heat produced and power consumed Purpose: - an owner of an IT environment has a reason for investing in IT. Reasons: - Home: be able to manage family finances, do school work, work from home, stream TV shows, purchasing etc. - School: Be able to manage curriculum, support student development, access teaching content, enable modern skills development. ORGANIZATIONAL CULTURE - refers to the shared values, beliefs, norms, behaviors, and practices that characterize a particular workplace or company. It’s like the collective personality of an organization. - A positive and healthy culture fosters employee satisfaction, motivation, and loyalty, leading to increased productivity and innovation. Factors: 1. Leadership Principles 2. Values and Beliefs 3. History and Leadership Style 4. Employee Behaviors