Free Essay

Theft and Intellectual Property

In: Computers and Technology

Submitted By mukundi2004
Words 611
Pages 3
1

         

Definition of intellectual property and the cyber space Questions to be answered by the research Research methods used The research Hypothesis Experiment Results Conclusion Recommendation References
2





What is intellectual property? In general, it is the intangible property that is the result of creativity e.g. patents or copyrights In relation to the cyberspace, it refers to the knowledge possessed in the notional environment in which communication over computer networks occurs.
3

   

Accessing the internet from search engines e.g. Google, ASK, et.c Copying and pasting contents into other programs and sites. Publishing the information for the public to access through other web sites. Posting media from hardcopies into a website.

Research on the level of intellectual property protection from theft.  Intellectual property: There is a great deal of debate these days on who owns the web ideas. This is a complex issue that is emerging and which require immediate action either by an international body by individual scientists. Many people publish their intellect property online hoping to get a great pitch from it, only knowing that it is at times monkey business due to plagiarism all over the world. Even though this happens, we still find it necessary to post our ideas online since it is a convenient way of e-commercing and dispersing any other information. What really happens when we say someone has stolen from a web site? The thing is that “cyber pirates” will copy all what you have worked for and paste into their newly created web sites.
4



Intellectual property is protected by the international law on cyberspace laws and one cannot copy paste information from the websites and /or hardcopies and claim it to be theirs.

When some contents were copied from some sites, it was found that it was possible to post it into other sites and share the information with other people pretending the information belongs to you.  When I was trying to make my own website, I found out that I could and I was able to post some media into my site. Who would tell that it was not my property or my newest idea? No one.


5

The results showed that the protection of the intellectual property is not well put into action that would ensure ones ideas are not misused.  Everything that you own in the cyberspace has already become a global property and you no longer own it alone. Be sure of that.  Even the write protected hardcopies are been ripped and hence one is able to disseminate the information and make a million pound out of someone else’s sweat.




In conclusion, I do know that the intellectual property is in danger, not in safe hands, since it can be used and be reused by other people without your permission. It therefore, leads me to bring out the fact that your intellectual property is not fully protected even by the courts since the courts themselves cannot define their territorial ability on curbing the problem. The jurisdiction on cyberspace has not yet been defined well.

6



I strongly recommend that the international law court, that is ICC to be given the responsibility to take proper measures on protecting intellectual property. This would eliminate the confusion in the cyber world.

1997 Cooley Godward L.L.LP. www.cooley.com Accessed on Wednesday 24th Aug. 2011  Beyrkeley Technology Law Journal, University of California –http:// www.law.bekeley.edu/journals/btlj/articles/vol12/Schlachter/html/rea der.html Accessed on Wednesday 24th Aug. 2011  http://www.giswatch.org/institutional-overview/civil-societyparticipation/world-intellectual -property-organisation-wipo Accessed on Wednesday 24th Aug. 2011  Concise Oxford Dictionary – Tenth Edition

7

Similar Documents

Free Essay

Cyberespionage and Intellectual Property Theft

...Running head: CYBER-ESPIONAGE AND INTELLECTUAL PROPERTY THEFT 1 Cyber-espionage and Intellectual Property (IP) theft: An overview of the rising threat and the potential responses by both the U. S. Government and U.S. Businesses Matthew Doyal Kennesaw State University Spring 2014 IS 8200 – Legal & Ethical Issues in IS CYBER-ESPIONAGE AND INTELLECTUAL PROPERTY THEFT Abstract 2 Society and business have become increasingly dependent upon data in the constantly connected world where everything that is said and done online leaves behind a massive ever-growing bread-crumb trail of information. With this ever larger quantity of data being transmitted on a range of devices as well as third party service providers being increasingly relied upon to store it; the threat of loss of confidential and sensitive data continues to expand exponentially (Online Trust Alliance, 2014, p. 3). “Breaches and data loss incidents have become a fact of life for organizations of every size and throughout the public and private sectors” (Online Trust Alliance, 2014, p. 4) making no organization immune. Given the growth of data and, therefore, data breaches the threat to the U.S. economy and individual U.S. businesses from trade secret theft is real and growing, therefore; a multi-pronged approach must be implemented by the public and private sectors alike. “Businesses must do their part to harden their cyber defenses, but the “take-home message here is that protecting IP from ‘them’ is an...

Words: 2645 - Pages: 11

Premium Essay

Theft of Intellectual Property at Trig Enterprises, Inc.

...Theft of intellectual property at Trig Enterprises, Inc. Librium Author Note This paper is being submitted on November 19, 2015, for Kevin Harris’s ISSC351-Computer Forensics course. Trig Enterprises, Inc. is an international supplement dietary company and it is located in St. Louis. In 2006, a newly designed and ready to manufacture product was comprised. One of the Trig’s competitors released the very similar product on the market before Trig did. A short time later, it’s found that the competitor’s website was very similar to the Trig’s website. This raised a flag about the company’s 22-year old graphics designer, Kevin K. The CEO of the company, contacted the IT department to monitor his computer/laptop and email accounts, his VOIP phone and wireless devices if there was any suspicious activity. IT department scanned his emails for the last a couple of years. No questionable information found. IT department continue to monitor his devices and emails for about three months. While he was under surveillance, another similar event happened. This time a product on the manufacturing process was compromised. This caused the company millions of dollars. CEO did not a choice but the contact the local police. After contacting the local police, the police’s compu In 2006, 22-year old graphics designer, Kevin K., suspected to leak the extremely important corporate data to its competitors. The owner of the company tries to solve the issue with...

Words: 466 - Pages: 2

Free Essay

E-Business and Intellectual Property

...(2015). Intellectual property theft: Get real. Retrieved, September 20, 2015, from http://www.ncpc.org/topics/intellectual-property-theft/facts-and-figure ARTICLE SYNOPSIS America is not only the richest country globally, but also the source of many innovations. The high number of innovations in America makes the country the greatest producer of intellectual property related to patents and copyrights. Intellectual property is very important to the United States because it significantly contributes to the development of national economy. However, inventions in America are facing the challenge of intellectual property theft. In the year 2014, the value of fake products such as electronic equipment, CDs and DVDs was 7 percent of world trade. With the advent of e-commerce, the rate of intellectual property theft has been on the rise. According to the United States Food and Drug Administration, the number of fake pharmaceutical products entering the United States has increased by 90 percent since the year 2005. The nature of impact that intellectual property theft brings to the United States calls for great need of implementing solution strategies (National Crime Prevention Council, 2015). LEGAL ISSUE Online pharmacies are among the leading organizations in intellectual property theft in the United States. Majority of these companies claim to be located in Canada, and they contribute to more than 50 percent of fake drugs that enter the United States. Intellectual property......

Words: 385 - Pages: 2

Premium Essay

Intellectual Property Rights

...Intellectual property rights provide the foundation for building and extending markets for new technology. Economists and policymakers are progressively realizing that to manage and encourage technological progress, there is a need of a framework of legal institutions that promotes its benefits but also limits its excess. The paramount difficulty of companies and individuals engaging in development of new technology of any kind is appropriating the fruits of their labor. In developed market economies, in spite of the presence of substantial intellectual property rights, the widespread imitation of intellectual property deems them imperfect and inadequate. Lax enforcement of domestic laws and regulations, and the absence of international treaties concerning the protection of international property rights further aggravate the problem. The framework and implementation of intellectual property rights shapes the success of major industries ranging from computer software, biotechnology to entertainment as it determines how they can market their products. Intellectual property is expensive to create but easy to reproduce. The fixed cost of producing intellectual property is high, but its marginal cost is low. For example, the research and development of a drug can cost billions of dollars, but its reproduction can easily be done at low costs. Lack of protection gives rise to free riding on the innovator’s production and kills the innovator’s incentive to produce more.......

Words: 1103 - Pages: 5

Premium Essay

Intellectual Property in Automobile Industry

...Intellectual Property Theft in the Automotive Industry Scope, Trends, and Mitigating Strategies Table of Contents Introduction………………………………………………………………………………..3 Scope of Intellectual Property Theft………………………………………………………3 Intellectual Property Theft and China……………………………………………………..4 Intellectual Property Theft in the Automotive Industry…………………………………...5 The Subtle Pick-Off……………………………………………………………….5 Piracy and China’s Global Emergence…………..………………………………………..6 Consequences of IP Theft…………………………………………………………………7 Mitigating Strategies………………………………………………………………………7 The Autoweb Intellectual Property Exchange…………………………………………….8 Fusion-DX………………………...………………………………………………9 GlobalSource………………………………………………………………….…..9 Data Integration Services……………………………………………………….…9 GlobalSource...………………………………………………………………….…9 Integrated Translations…………………………………………………………….9 Autoweb Company Overview……………………………………………………10 Bibliography………………………………………………………..……………………11 www.autoweb.net 2 Introduction I ntellectual Property protection in the manufactured goods sector is not a new idea. Laws prohibiting manufactured goods counterfeiting and piracy activities existed as far back as the Middle Ages when bakers, artisans, and craftsmen used distinctive marks to distinguish their products and work from would-be counterfeiters. The general problems associated with modern day counterfeiting and intellectual property piracy have long been recognized, yet today’s high-tech economy has magnified the problem......

Words: 3125 - Pages: 13

Premium Essay

Cybercrime Intellectual

...Chapter 5 talks about intellectual property theft which is the result of any creative or innovative endeavor from a human and the expression of this endeavor like books, recording and choreography to name a few. With technology being a big part of our lives intellectual property theft is integrated into copyright statues. Intellectual property theft laws in the United States grant the exclusive ownership the rights to use produce and distribute creative work to the creator or author. There are four types intellectual property which are copyrights, patents, trademark and trade secrets. Copyrights deal with forms of creativity in communication like novels, music, songs and movies. Patents protect new invention and cannot be exploited without the authorization of the patent owner. Trademarks are designed to individualize goods to distinguish the source like a symbol, logo and a slogan. Before you can combat the theft of intellectual property theft we need to know what’s behind the motivation of the behavior of theft. Some believe that low self control is a result behind theft. With information technology being so advance it poses a serious threat to authors of copyright material. With every idea or invention being copied on to digital making it easier to copy distribute copyrighted material like computer software, pictures and music which is called piracy. A good example is when me and the family venture out to the swap meet and there you see a vendor selling bootleg movies for......

Words: 362 - Pages: 2

Free Essay

The Most Pertinent Issues Facing Computer

...and other financial identity theft, the sabotaging of critical infrastructure, and stealing of intellectual property. This summary will briefly describe examples of each of these cybercrimes as well as outline the most pressing threat currently as well as the infrastructure that is in place to fight these crimes. Internet money scams that arrive in a myriad of different forms are rife throughout the cyber world. Fake prize sweepstakes, fictitious jobs online, and charities that don't exist are just a few of the internet scams that are present online. An example I will give is a job that a relative of mine was duped into believing he had obtained online. The job required for him to serve as a de facto broker of sorts for an international art gallery. His alleged job was supposed to require him to transfer money that was appropriated for the art. He would receive an amount in his bank account of 3000-5000 in a cashiers' check and would be required to allow the check to be deposited in his account. After the check was deposited he would transfer 3/4ths of the check and keep the rest for payment. He was required to send the 4300 to a location in Eastern Europe. The caveat is that the check that he received bounced and was a fake; therefore, he was on the hook with his bank for the entire $5000 dollars and the criminals subsequently received $4300 for their fraud. Many scams like this occur every day in America and around the world. Identity theft is the number one crime in......

Words: 734 - Pages: 3

Free Essay

Intellectual Property

...products and work from mitigate the risks associated with would-be counterfeiters. The general increased levels of intellectual property problems associated with modern day theft, manufacturers must assess their counterfeiting and intellectual property intellectual property strategy and adopt piracy have long been recognized, yet more sophisticated methods of today’s high-tech economy has protection to keep pace with today’s magnified the problem of intellectual more refined counterfeiting operations. property theft, allowing counterfeiting Scope of Intellectual Property Theft T he illicit business of copying other’s products and designs and selling them as cheaper, usually substandard dollars from the global economy. In 1996, this figure jumped to as much as an estimated $200 billion. The look-a-likes is an underground industry economic value of global counterfeiting worth billions. In a written statement in 2003 is estimated at $500 billion. before the Senate Committee on the Various organizations, including Judiciary, Thomas J. Donohue, President Interpol, estimate that the trade in and CEO of the U.S. Chamber of counterfeit goods ranges between 6-9% Commerce stated, “Growth in the trade of all current world trade with volume of illegitimate goods over the past 20 sharply rising.2 The Federal Bureau of years is astounding, intellectual property Investigation has called counterfeiting crime is one of the fastest growing “the crime of the 21st century”......

Words: 334 - Pages: 2

Premium Essay

Legal and Ethical Considerations in Marketing

...and Intellectual Property Amanda Terry Professor: Dr. Michael Hanners LEG 500- Law, Ethics, and Corporate Governance March 12, 2015 Introduction John, a former research employee at PharmaCare pharmaceuticals, asked my law firm to represent him as a client. He expressed his concerns about his involvement with PharmaCare’s top-selling drug AD23. John and his team of pharmacists discovered that the drug could slow down the progression of Alzheimer’s. Therefore, his team reformulating the drug to maximize the effect of the drug without the approval from Federal and Drug Administration. In this paper, I will evaluate three ethical issues relating to marketing and advertising, intellectual property, and regulation of product safety, as well as, analyze whether PharmaCare violated any of the issues in questions. I will argue the pros and cons of Direct-to-Consumer (DTC) Marketing by drug companies. I will determine which parties were responsible for regulating compounding pharmacies under the current regulatory scheme. Also, the actions that either party, or the FDA could/ should have taken in this scenario; whether PharmaCare could face legal exposure surrounding its practices. I will analyze whether or not the PharmaCare used U.S. Law to protect its own intellectual property, and if John (the client) has any claim of being the true “inventor” of AD23. I will present at least three ways the company could compensate John for the use of his intellectual property......

Words: 3335 - Pages: 14

Premium Essay

Forms

...Questions 1. What is the relationship among the various governments, institutions, organizations, and companies in developing legal codes to combat software piracy? Technically, the standards of software piracy are unequivocal. Thus, parties have been hopeful that collective political arrangements and legal actions by companies, associations, governments, and institutions would lead to a decline in global software piracy. However, coordinated anti-piracy initiatives such as high-profile legal proceedings against companies using illegal software, increased government cooperation in providing legal protection for intellectual property, and the criminalization of software piracy have proven to be largely ineffective. Even efforts at the transnational level to get nations to sign treaties and to require them to protect and enforce intellectual property rights according to global, not local, standards have not yielded the desired results. Unfortunately, the ease with which software can be duplicated, sold, and distributed continues to baffle the industry. 2. In your opinion, should software companies, industry associations, home governments, or transnational institutions take the lead in aggressively negotiating with the governments of countries with high piracy rates? Why? Because of the enormous economic, technological, and political implications of the problem, software companies, industry associations, home governments, and transnational institutions should all......

Words: 703 - Pages: 3

Premium Essay

7. Are There Procedures and Processes That Are Common to the Use of Sdlc, Prototyping, and Agile Methodologies? Explain Any That You Can Identify and Then Indicate Why the Methodologies Are Considered to Be Different

...Intellectual Property Protection Venkata Satyanarayana. Alokam Spring 2016 IST Fundamentals 5500 Wilmington University Intellectual property protection It is a term alluding to manifestations of the acumen for which a restraining infrastructure is allocated to assigned proprietors by law. Some normal sorts of protected innovation rights (IPR) are trademarks, copyright, licenses, mechanical outline rights, and in a few locales competitive advantage like all these spread music, writing, and other aesthetic works; revelations and developments; and words, expressions, images, and plans. Patents A patent is a type of right conceded by the administration to a creator, giving the proprietor the privilege to prohibit others from making, utilizing, offering, offering to offer, and importing an innovation for a restricted time frame, in return for general society exposure of the development. An innovation is an answer for a particular innovation issue, which might be an item or a procedure and for the most part needs to satisfy three fundamental prerequisites: it must be new, not evident and there should be a modern materialness. Copyright A copyright gives the maker of a unique work elite right to it, as a rule temporarily. Copyright might apply to an extensive variety of imaginative, scholarly, or creative structures, or "works". Copyright does not cover thoughts and data themselves, just the structure or way in which they are communicated. Industrial design rights A...

Words: 4492 - Pages: 18

Free Essay

Understanding Tangible Property

...Understanding Tangible Property Team E LAW531 February 07, 2012 Michelle Hamilton Understanding Tangible Property This week team discussion involves understanding the tangible property right of a business. The business rights depends in the field of industry that companies conducts its businesses in. Some tangible are similar while others pertain uniquely to its industry. Discussion amongst the team member lead to the decision to undertake the retail industry such as Wal-Mart, Target, Best Buy and other major retailer organization in the country. The paper will bring about an identification of its tangible assets and the company needs to consecutively protect and identify these properties. Cheeseman stated that “Tangible properties have physical characteristics, such as building, goods, animals, and minerals” (Business Law, 2010, p. 739). Big retail stores like Wal-Mart, Best Buy, and Target suffers from theft and shoplifting on a daily basis in its daily operations. These thefts take in numerous forms, shoplifting of clothing from a department store, eating a grape from a grocery store, or purchasing stolen property is considered tangible. Theft of tangible property from any of these mentioned retailers is infringing on property rights. Retailers and grocery chains industries implement security measures to protect their profits and consumers, however; these measures cost the retailer industries millions of dollars in operation cost each year. ......

Words: 723 - Pages: 3

Free Essay

Leg 500 Assignment 4 Week 10

... 4 RUNNING HEAD: LEGAL AND ETHICAL CONSIDERATIONS IN MARKETING, PRODUCT SAFETY AND INTELLECTUAL PROPERTY LEGAL AND ETHICAL CONSIDERATIONS IN MARKETING, PRODUCT SAFETY AND INTELLECTUAL PROPERTY [Student Name] [Instructor’s Name] [Date] [Course Name] Introduction This paper is concern with legal and ethical issues in advertising, marketing, regulations and intellectual property of product safety with respect to PharmaCARE which is a pharmaceutical company. The paper includes the information regarding drug companies, Direct to Consumers (DTC) marketing. Next we will determine the role of Food and Drug Administration (FDA) in regulatory schemes of pharmacies and determine that whether FDA empower over compounding pharmacies. In this paper, I have to make decision about PharmaCARE that whether the company use of intellectual property of Colberia. After this, I will analyze PharmaCARE ways to use US laws to protect intellectual property to coop with intellectual property in Colberia. To compensate the people of suffered from damages due to usage of AD23 will be studied and different suggestions will be made to compensate them. In the end, three changes will be recommended to PharmaCARE to go forward ethically. 1-Ethical issues relating to marketing and advertising, intellectual property, and regulation of product safety and examine whether PharmaCARE violated any of the issues in......

Words: 2296 - Pages: 10

Premium Essay

Chapter 9

...X 1 1. If an organization has three information assets to evaluate for risk management as shown in the accompanying data, which vulnerability should be evaluated for additional controls first? Which one should be evaluated last? Asset A: Switch L47 connects a network to the Internet. It has two vulnerabilities. It is susceptible to hardware failure at a likelihood of 0.2 and is subject to an SNMP buffer overflow attack at a likelihood of 0.1. The switch has an impact rating of 90 and no current controls in place. You are 75% certain of the assumptions and data. Asset B: Sever WebSrv6 hosts a company Web site and performs e-commerce transactions. It has a Web server version that can be attacked by sending it invalid Unicode values. The likelihood of that attack is estimated at 0.1. The server has been assigned an impact value of 100, and a control has been implanted that reduces the impact of the vulnerability by 75%. You are 80% certain of the assumptions and data. Asset C: Operators use an MGMT45 control console to monitor operations in the server room. It has no passwords and is susceptible to unlogged misuse by the operators. Estimates show the likelihood of misuse is 0.1. There are no controls in place on this asset; it has an impact rating of 5. You are 90% certain of the assumptions and data. 3. Suppose XYZ Software Company......

Words: 659 - Pages: 3

Premium Essay

Cyber Crime

...invention that has been developed and patented by another • A unauthorized person acquired and uses the account number or pin of someone credit or debit card to change items to that person’s account Forgery and Counterfeiting • Both forgery and counterfeiting involve fraudulently creating or using false or unauthorized versions of currency, documents, artwork or other property that only specified entities or persons have the right to make or use or unauthorized versions of documents such as stock certificates, birth records, lottery tickets, licenses , passports or other papers that only government agencies or other entities can issue. • Two broad types of crimes losses from forgery/counterfeiting o Inducing an organization to accept falsified documents, etc, to exchange something od valye for something that is valueless o Impersonating an organization using and unauthorized or stolen document to the detriment od the organization Computer Crime • Computer sabotage • Fraud and embezzlement • Computer network breach • Theft through hacking • Theft of data storage systems • Theft of computer time • Denial of service • Espionage Crime Risk Control Measures • Sound personnel policies • Physical controls • Procedural controls • Managerial controls •...

Words: 632 - Pages: 3