Beruflich Dokumente
Kultur Dokumente
COPYRIGHTS
INTRODUCTION TO COPYRIGHT:
Copyright as to mean the exclusive right to do or authorise the doing of the following acts in
respect of a work or any substantial part thereof, namely In the case of literary, dramatic or
musical work (except computer programme):
(i) reproducing the work in any material form which includes storing of it in any medium by
electronic means;
(ii) issuing copies of the work to the public which are not already in circulation;
(iii) performing the work in public or communicating it to the public;
(iv) making any cinematograph film or sound recording in respect of the work;
making any translation or adaptation of the work. Further any of the above mentioned acts in
relation to work can be done in the case of translation or adaptation of the work.
In the case of a computer programme:
(i) to do any of the acts specified in respect of a literary, dramatic or musical work; and
(ii) to sell or give on commercial rental or offer for sale or for commercial rental any copy of
the
computer programme. However, such commercial rental does not apply in respect of
computer
programmes where the programme itself is not the essential object of the rental.
In the case of an artistic work:
(i) reproducing the work in any material form including depiction in three dimensions of a
two
dimensional work or in two dimensions of a three dimensional work;
(ii) communicating the work to the public;
(iii) issuing copies of work to the public which are not already in existence;
(iv) including work in any cinematograph film;
making adaptation of the work, and to do any of the above acts in relation to an adaptation of
the work.
In the case of cinematograph film and sound recording:
(i) making a copy of the film including a photograph of any image or making any other sound
recordingembodying it;
(ii) selling or giving on hire or offer for sale or hire any copy of the film/sound recording
even if such copy has been sold or given on hire on earlier occasions; and
Copy right protects the literary, musical, graphic or other artistic form in which an author
expresses intellectual concepts.
Author: An author is the creator of copyrightable expression, whether literary, musical or
otherwise; or under certain circumstances, the party that commissions a work or pays for the
work under an employment agreement.
Work of authorship: Creation of intellectual or artistic effort fixed or embodied in a
perceptible form and meeting the statutory standards of copyright protection.
Originality: Originality means that a work is original to the author. It requires only a modest
degree of intellectual labor. For ex: two photographers take pictures of house. One uses
equipment and creates magnificently composed picture, while the other uses a simple camera
with a fixed lens. Each photograph would be original to its author. In fact even if the photos
were identical, each would be copyrightable, assuming neither photographer copied the other.
Therefore, despite aesthetic issues, there would be sufficient originality to satisfy copyright
for both photographers.
Fixation: a work is fixed when it is embodied in a tangible medium of expression by or uder
the authority of the author, which is sufficiently permanent or stable to permit it to be
perceived, reproduced, or otherwise communicated for a period of more than transitory
duration; in the case of sounds images, or both that are being transmitted, a work is fixed if a
fixation of work is being made simultaneously with its transmission.
Eight categories of works of authorship:
Literary works: Works, other than audiovisual works, expressed in words, numbers, or other
verbal or numerical symbols or indicia, regardless of the nature of the material objects, such
as books, periodicals, manuscripts, phonorecords, film, tapes, disks, or cards in which they
are embodied.
Dramatic works: It is usually a play prepared for stage, cinema, radio or television.
Narrative presentations (and any accompanying music) that generally use dialogue and stage
directions as the basis for a theatrical exhibition.
Choreography: it is the composition and arrangement of dance moments.
Pantomime: A form of theater expressed by gestures but without words.
Pictoral, graphic and sculptural works: Two dimensional and three dimensional works of
fine, graphic, and applied art, photographs, prints and art reproductions, maps, globes, charts,
diagrams, models, and technical drawings, including architectural plans. Such works include
works of artistic craftsmanship insofar as their form but not their mechanical or utilitarian
aspects are concerned. The design of a useful article is considered a pictorial, graphic, or
sculptural work only if, and only to the extent that, such design incorporates pictorial,
graphic, or sculptural features that can be identified separately from, and are capable of
existing independently of, the utilitarian aspects of the article.
Useful article: An article having an intrinsic utilitarian function that is not merely to portray
the appearance of the article or to convey information. An article that is normally a part of
useful article is considered a useful article.
Audiovisual works: Works that consists of a series of related images which are intrinsically
intended to be shown by the use of machines or devices, such as projectors, viewers or
electronic equipment, together with accompanying sounds, if any, regardless of the nature of
the material objects, such as films or tapes, in which the works are embodied.
Motion pictures: Audio visual works consisting of a series of related images which, when
shown in succession, impart an impression of motion, together with accompanying sounds if
any.
Architectural work: The design of a building as embodied in any tangible medium of
expression, including a building, architectural plans, or drawings; it includes the overall form
as well as the arrangement and composition of spaces and elements in the design, but does
not include individual standard features.
Musical work: A composition incorporating melody, rhythm, and harmonic elements (and
accompanying lyrics, if any).
Sound recordings: Works that result from the fixation of a series of musical, spoken, or other
sounds, but not including the sounds accompanying a motion picture or other audiovisual
work, regardless of the nature of the material objects, such as disks, tapes, or other
phonorecords, in which they are embodied.
RIGHTS AFFORDED BY COPYRIGHT LAW:
The authors are afforded with bundle of rights which includes:
Right to reproduce the work
Right to distribute the work to the public
The first sale doctrine: Limitations on the distributive right
Right to adapt the work: Right to prepare derivative works
Right of public performance
Right to display the work publicly
Works of visual art: Moral rights
Right to reproduce the work
Under this right, no one other than the copyright owner may make any reproductions or
copies of the work. Examples of unauthorized acts which are prohibited under this right
include photocopying a book, copying a computer software program, using a cartoon
character on a t-shirt, and incorporating a portion of another's song into a new song.
Right to distribute the work to the public
The distribution right grants to the copyright holder the exclusive right to make a work
available to the public by sale, rental, lease, or lending.
This right allows the copyright holder to prevent the distribution of unauthorized copies of a
work. In addition, the right allows the copyright holder to control the first distribution of a
particular authorized copy.
However, the distribution right is limited by the "first sale doctrine", which states that after
the first sale or distribution of a copy, the copyright holder can no longer control what
happens to that copy.
Thus, after a book has been purchased at a book store (the first sale of a copy), the copyright
holder has no say over how that copy is further distributed. Thus, the book could be rented or
resold without the permission of the copyright holder.
The first sale doctrine: Limitations on the distributive right
Once the first sale of a copy or phonorecord has occurred, the authors rights as to that copy
are limited. This limitation is commonly is known as the first sale doctrine. Right of the
owner of a lawfully made copy or phonorecord to sell or otherwise dispose of possession of
that copy or phonorecord, without the authority of the copyright owner. The doctrine includes
the right of the owner of a lawfully mae copy to display that copy publicly, either directly or
by the projection of no more than one image at a 6time, to viewers present at the place where
the copy is located, without authorization from the copyright owner.
Right to adapt the work: Right to prepare derivative works
The right to make a derivative work overlaps somewhat with the reproduction right.
According to the Copyright Act, a derivative work is a work based upon one or more
preexisting works, such as a translation, musical arrangement, dramatization, fictionalization,
motion picture version, sound recording, art reproduction, abridgment, condensation, or any
other form in which a work may be recast, transformed, or adapted.
A derivative work usually involves a type of transformation, such as the transformation of a
novel into a motion picture. In the computer industry, a second version of a software program
is generally considered a derivative work based upon the earlier version.
Right of public performance
The public performance right allows the copyright holder to control the public performance
of certain copyrighted works. The scope of the performance right is limited to the following
types of works:
Literary works, musical works, dramatic works, choreographic works, pantomimes, motion
pictures, and audio visual works.
Under the public performance right, a copyright holder is allowed to control when the work is
performed "publicly." A performance is considered "public" when the work is performed in a
"place open to the public or at a place where a substantial number of persons outside of a
normal circle of a family and its social acquaintances are gathered."
The public performance right is generally held to cover computer software, since software is
considered a literary work under the Copyright Act.
In addition, many software programs fall under the definition of an audio visual work.
The application of the public performance right to software has not be fully developed,
except that it is clear that a publicly available video game is controlled by this right.
Right to display the work publicly
All copyrighted works other than sound recordings and works of architecture, the copyright
owner has the exclusive right to display the work publicly. To show a copy of a work, either
directly or by means of a film, slide, television image, or any other device or process where
the public is gathered or the work is transmitted or otherwise communicated to the public; in
the case of a motion picture or other audio visual work, the non sequential showing of
individual images.
Works of visual art: Moral rights
Moral rights are rights that protect the professional honor and reputation of an artist by
guaranteeing the right to claim or disclaim authorship of a work and the right to prevent, in
certain cases, distortion, mutilation, or other modification of the work.
Under copyright act either a painting, drawing, print, or sculpture, existing in a single copy, in
a single copy, in a limited edition of 200 copies or fewer that are signed and consecutively
numbered by the autyhor, or in the case of a sculpture, in multiple cast, carved or fabricated
sculptures of 200 or fewer that are consecutively numbered by the author and bear the
signature or other identifying mark of the author; or a still photographic image produced for
exhibition purposes only, existing in a signed by the author, or in a limited edition of 200
copies or fewer that are signed and consecutively numbered by the author.
RIGHTS OF PERFORMERS:
Performer
As per the Indian Copyright Act, a "Performer" includes an actor, singer, musician, dancer,
acrobat, juggler, conjurer, snake charmer, a person delivering a lecture or any other person
who makes a performance.
Performance:
"Performance" in relation to performers right, means any visual or acoustic presentation
made live by one or more performers.
Performers rights subsist for 25 years.
Broadcast Reproduction Right
Section 37 entitles every broadcasting organisation to have a special right to be known as
"broadcast reproduction right" in respect of its broadcasts for twenty-five years from the
beginning of the calendar year next following the year in which the broadcast is made.
As per sub Section (3) of Section 37 during the continuance of a broadcast reproduction right
in relation to any broadcast, any person who, without the licence of the owner of the right
does any of the following acts of the broadcast or any substantial part thereof,(a) re-broadcasts the broadcast; or
(b) causes the broadcast to be heard or seen by the public on payment of any charges; or
(c) makes any sound recording or visual recording of the broadcast; or
(d) makes any reproduction of such sound recording or visual recording where such initial
recording was done without licence or, where it was licensed, for any purpose not envisaged
by such licence; or
(e) sells or gives on commercial rental or offer for sale or for such rental, any such sound
recording or visual recording referred to in clause (c) or clause (d) and subject to the
provisions of Section 39 deemed to have infringed broadcast reproduction right..
Performers Right
Section 38 provides that where any performer appears or engages in any performance, he
shall have a special right to be known as the "performer's right" in relation to such
performance. The performer's right subsist until fifty years from the beginning of the calendar
year next following the year in which the performance is made.
Exclusive Right of Performer
As per Section 38A without prejudice to the rights conferred on authors, the performers right
which is an exclusive right subject to the provisions of the Act to do or authorise for doing
any of the following acts in respect of the performance or any substantial part thereof,
namely:
(a) to make a sound recording or a visual recording of the performance, including
(i) reproduction of it in any material form including the storing of it in any medium by
electronic or any other means;
(ii) issuance of copies of it to the public not being copies already in circulation;
(iii) communication of it to the public;
(iv) selling or giving it on commercial rental or offer for sale or for commercial rental any
copy of the recording;
(b) to broadcast or communicate the performance to the public except where the performance
is already broadcast.
It may be noted that once a performer has, by written agreement, consented to the
incorporation of his performance in a cinematograph film he shall not, in the absence of any
contract to the contrary, object to the enjoyment by the producer of the film of the
performers right in the same film. However, the performer shall be entitled for royalties in
case of making of the performances for commercial use.
Rights of a performer:
A performer has the following rights in his/her performance:
Making infringing copies for sale or hire or selling or letting them for hire;
ii.
Permitting any place for the performance of works in public where such performance
constitutes infringement of copyright;
iii.
iv.
v.
If a person permits for profit any place to be used for the communication of a work to the
public, where such communication constitutes an infringement of the copyright in the work,
unless he was not aware and had no reasonable ground for believing that such communication
to the public would be an infringement of copyright, he will be deemed to have committed an
offence under the Copyright Act.
A copyright owner can take legal action against any person who infringes the copyright in the
work. The copyright owner is entitled to remedies by way of injunctions, damages and
accounts.
The District Court concerned has the jurisdiction in civil suits regarding copyright
infringement.
Proof of the authorship of a work:
Where, in the case of a literary, dramatic, musical or artistic work, a name purporting to be
that of the author or the publisher appears on copies of the work as published, or, in the case
of an artistic work appeared on the work where it was made, the person whose name so
appears or appeared shall, in any proceeding in respect of copyright in such work, be
presumed, unless the contrary is proved, to be the author or the publisher of the work, as the
case may be.
Rights of owner over infringing copies and equipments used for making infringing
copies:
All infringing copies of any work in which copyright subsists and all plates used or intended
to be used for the production of such infringing copies shall be deemed to be the property of
the owner of the copyright.
Remedies and legal proceedings:
Where any person claiming to be the owner of copyright in any work, by circulars,
advertisements or otherwise, threatens any other person with any legal proceedings or
liability in respect of an alleged infringement of copyright, any person aggrieved thereby may
institute a declaratory suit that the alleged infringement to which the threats related was not in
fact an infringement of any legal rights of the person making such threats and may in any
such suit
a. obtain an injunction against the continuance of such threats; and
b. recover such damages, if any, as he has sustained by reason of such threats.
Any person who knowingly infringes or abets the infringement of the copyright in any work
commits criminal offence under Section 63 of the Copyright Act.
The minimum punishment for infringement of copyright is imprisonment for six months with
the minimum fine of Rs. 50,000/-. In the case of a second and subsequent conviction the
minimum punishment is imprisonment for one year and fine of Rs. one lakh.
Any police officer, not below the rank of a sub inspector, may, if he is satisfied that an
offence in respect of the infringement of copyright in any work has been, is being, or is likely
to be committed, seize without warrant, all copies of the work and all plates used for the
purpose of making infringing copies of the work, wherever found, and all copies and plates
so seized shall, as soon as practicable be produced before a magistrate.
The Court may order delivery to the owner of the copyright all such copies or plates.
Every person who at the time the offence was committed was in charge of, and was
responsible to the company for, the conduct of the business of the company, as well as the
company shall be deemed to be guilty of such offence and shall be liable to be proceeded
against.
No court inferior to that of a Metropolitan Magistrate or a Judicial Magistrate of the first class
shall try any offence under the Copyright Act.
A police officer not below the rank of sub inspector can seize without warrant all infringing
copies of the work.
COPYRIGHT OWNERSHIP:
Person or persons holding title to copyright is the owner of copyright. Either the author or
any party to whom the author has licensed or transferred a right under the act is the owner of
copyright. The ownership of copyright enables the owner to transfer, license, sell or grant
rights to another person. Parties may settle the matter or submit it to a court for final
determination regarding copyright disputes.
Registration does not prove ownership:
Registration of copyright by the copyright office does not prove ownership, but registration
within five years of publication does create a presumption of ownership or prima facie proof
of title. The copyright office may under certain circumstances, issue a second registration
without cancelling the first one and let the parties litigate the ownership issue.
Transfer of copyright:
The following are various methods of transferring copyright ownership:
Assignment or exclusive license: an assignment is a transfer of ownership interest. An
exclusive license is a grant of one or all of the rights constituting copyright in such a manner
that no other party will be granted a similar right. Assignments and exclusive licenses require
a written agreement evidencing the transfer, signed by the party transferring rights.
Mortgage or security right: a copyright may be mortgaged or used as security for an
obligation. Mortgages and security interest transfers require a written agreement evidencing
the transfer, signed by party transferring rights.
Transfer upon death: If a owner of copyright dies with a valid will, the copyright will be
transferred to the designated beneficiary. If an owner of copyright dies without a will, transfer
of ownership will occur according to the rules of intestate succession.
Operation of law: under certain circumstances (ex: bankruptcy, mortgage, foreclosure,
divorce) a court can order the transfer of an interest in copyright.
LIMITATIONS OF COPYRIGHTS:
1. Libraries or archives may reproduce and distribute one copy of a copyrighted work
and maintain three copies for preservation if there is no commercial advantage, the
library is open to the public, and a copyright notice is placed on the work.
2. Libraries and archives are not liable for infringement for unauthorized photocopying
of copyrighted works by their patrons as long as a notice is placed on the equipment
warning that the making of copies may be subject to copyright law.
3. Secondary transmissions whereby hotels and other similar establishments relay radio
and television transmissions to private guest rooms without charge are acceptable.
4. Radio and television stations that have entered into lawful arrangements to perform
works may make one temporary or ephemeral recording of the work so that it is easier
for them to transmit it and may preserve it for archival purposes. Ex: a radio station
may copy a compact disc onto a cartridge so it can be readily played.
5. An owner of a computer program may make a copy of it for archival or backup
purposes.
6. Displays in face to face teaching activities of non-profit educational institutions and
certain transmissions that are part ofttttt systematic instructional activities of a
governmental body or non-profit educational institution.
7. Displays in the course of religious worship and services.
8. Home style type displays.
COPYRIGHT FORMALITIES AND REGISTRATION:
Copyright formalities are divided into the following sections:
1.
2.
3.
4.
5.
it informs the public that the work is protected by copyright (and thereby helps to
circle" notice is not used to indicate protection of the underlying musical, dramatic, or literary
work that is recorded. Instead, a symbol composed of the letter "P" in a circle is used. Since
computer software and apps for mobile devices are considered to be visually perceptible
(with the aid of a machine), the copyright notice for software and apps should use the C in a
circle format.
The notice should be affixed to copies or phonorecords of the work in such a manner and
location as to give reasonable notice of the claim of copyright. For computer software, the
copyright notice is generally placed on the medium of distribution. If physical media is used
to distribute the software, the notice should be placed on the disk that contains the software.
If the software is downloaded, such as a mobile device app downloaded from an app store, a
copyright notice should appear on the page or screen that is displayed when the product is
downloaded. In addition, it is wise to make the copyright notice visible on the screen when
the program is executed. One way of doing this is to include the notice on a splash screen that
is temporarily shown when the program is initially executed.
COPYRIGHT REGISTRATION
Copyright registration is the process by which a formal claim of copyright is filed on a work
with the U.S. Copyright Office. Registration is not a condition of copyright protection,
although it is a prerequisite for filing a copyright lawsuit on U.S. origin works. However, it is
possible to file a lawsuit on a previously unregistered work merely by filing an application
for registration immediately prior to initiating the lawsuit.
Even though registration is not a requirement for copyright protection, the Copyright Act
does provides several inducements or advantages to encourage copyright owners to file for
copyright registration. Among these advantages are the following:
certificate;
Registration establishes a public record of the copyright claim and allows for the
An application for copyright registration may be made at any time during the life of the
copyright (see the BitLaw discussion on the duration of copyrights for more information). An
application to register a work is made by submitting the following three items to the U.S.
Copyright Office:
1. a properly completed application form;
2. a nonrefundable filing fee (see the Copyright Office website for more details on the
fee); and
3. a nonreturnable deposit of the work being registered.
4. There are a variety of copyright registration forms which can be used; the correct
5.
6.
7.
8.
Every GATT member country must provide penalties for copyright infringement, including
injunctions and monetary damages.
Every GATT member country must provide a means for excluding infringing goods at its
border.
SEMICONDUCTOR CHIP PROTECTION ACT:
Introduction Semiconductor Integrated Circuits (ICs) are embedded in a wide and varied
assortment of devices that have become commonplace in our daily life. Microwaves, mobile
phones, televisions, computers, music players, digital cameras, automobiles, etc. have a large
number of ICs that perform various functions. The extensive use of ICs can be attributed to
integration of a large number of tiny components (transistors) onto a small chip instead of
manual assembly of circuits using discrete electronic components that was prevalent earlier.
The integrated circuits mass production capability, reliability, and building-block approach to
circuit design ensured the rapid adoption of standardized ICs in place of designs using
discrete transistors.
Semiconductor Layout Design
Layout design may be defined as the process of creating an accurate physical representation
of an engineering drawing that conforms to constraints imposed by the manufacturing
process, the design flow, and the performance requirements shown to be feasible by
simulation.
Semiconductor Design Protection
The United States of America was the home to semiconductor industry and it came as no
surprise that the USA was the first jurisdiction to initiate legislation for protection of
semiconductor layout designs. Thereafter, more countries have followed suit and have
enacted legislation to protect semiconductor design work in their territories. The protection of
layout design in these countries can be primarily attributed to three reasons: compliance with
World Trade Organization (WTO) membership requirement, protection of their domestic
semiconductor layout design companies, and protection of their domestic semiconductor
manufacturing industries. The legislations enacted in few of the jurisdictions are described in
the later sections.
At the behest of the semiconductor industry and to safeguard the semiconductor industrys
significant contribution to the US economy, the US Congress enacted the Semiconductor
Chip Protection Act (SCPA) in 1984. The provisions of the SCPA are briefly outlined below.
A semiconductor chip product as defined by the SCPA is the final or intermediate form of
any product: (a) having two or more layers of metallic, insulating, or semiconductor material,
deposited or otherwise placed on, or etched away or otherwise removed from, a piece of
semiconductor material in accordance with a predetermined pattern; and (b) intended to
perform electronic circuitry functions.
A mask work is defined as a series of related images, however fixed or encoded: (a) having
or representing the predetermined, three-dimensional pattern of metallic, insulating, or
semiconductor material present or removed from the layers of a semiconductor chip product;
and (b) in which series the relation of the images to one another is that each image has the
pattern of the surface of one form of the semiconductor chip product.
Protection
The SCPA grants the owner of a mask work the exclusive rights to reproduce the mask work
through optical, electronic or any other means and to import or distribute a semiconductor
chip product in which the mask work is embodied. The SCPA also allows the owner of the
exclusive rights to transfer or license all or some of the exclusive rights. The owner of a mask
work granted under the SCPA may affix a notice indicating such protection. The notice of
protection may consist of the words mask work, or the symbol *M*, or the letter M in a
circle. The notice of protection can also be shown by indicating the name of the owner or
owners of the mask work or an abbreviation by which the name is recognized or is generally
known. Commonly used designs cannot be protected either individually or in combination if
the combination is obvious to a Person Ordinarily Skilled In The Art (POSITA). Moreover,
any variants of the known designs and combination of the variants cannot be protected if
either the variants or the combination is obvious to the POSITA. Further, the SCPA does not
extend protection to any idea, procedure, process, system, method of operation, concept,
principle, or discovery, regardless of the form in which it is described, explained, illustrated,
or embodied in such work.
Duration of Protection
The protection granted to mask works shall commence on the date on which the mask work is
registered or on the date on which the mask work was first commercially exploited anywhere
in the world, whichever occurs first. The protection provided to mask works shall extend till
the end of the calendar year of the tenth year from the date on which such protection
commences. For example, if the protection of a mask work commenced on January 1, 2000
then the protection will not expire on January 1, 2010 but will expire on December 31, 2010.
Limitation of Exclusive Rights:
Reverse Engineering
The SCPA allows reverse engineering of ICs and does not consider reproduction of the mask
work by a person as an infringement of exclusive rights of an owner of the mask work.
According to 17 USC 906, reverse engineering is not considered as an act of infringement.
However, this is applicable when the mask work was reproduced solely for the purpose of
teaching, analyzing, or evaluating the concepts or techniques embodied in the mask work or
the circuitry, logic flow, or organization of components used in the mask work. Thus, a
person does not infringe on the exclusive rights of the owner if the person performs an
analysis on an IC to incorporate the results of the analysis in an original mask work which is
to be distributed. However, in the event of creation of such an original mask work, the person
may not reproduce a particular semiconductor chip product without the authority of the
owner of the mask work.
Innocent Infringement
In addition to allowing reverse engineering of ICs for the purposes of teaching and further
improving existing designs, the SCPA limits the exclusive rights of the owners of mask works
in case of innocent infringement. A purchaser of an infringing semiconductor chip product is
considered as innocent if the purchaser was not aware of protection of the mask work
embodied in the semiconductor chip product. In this case, according to SCPA an innocent
purchaser will not be liable with respect to importation or distribution of units of the
infringing semiconductor chip product. However, if the purchaser was aware of protection of
the mask work before purchasing the infringing semiconductor chip then the purchaser is
held liable for a reasonable royalty. The reasonable royalty is levied for each unit of the
infringing semiconductor chip product that the purchaser imports or distributes. The
immunity provided to an innocent purchaser from liability extends to any person who directly
or indirectly purchases an infringing semiconductor chip product from the innocent
purchaser.
UNIT -5
TRADE SECRETS
INTRODUCTION TO TRADE SECRETS:
A trade secret is defined as any formula, pattern, device, or compilation of information which
is used in ones business that is treated with confidentiality and which gives the owner of the
secret an opportunity to obtain an advantage over competitors who do not know or use it.
SUBJECT MATTER OF TRADE SECRET:
Trade secret law protects information, including a formula, pattern, compilation, program,
device, method, technique, or process, that:
Derives independent economic value from not being generally known or readily
ascertainable by proper means by other persons, and
Is the subject of efforts that are reasonable under the circumstances to maintain its secrecy
MAINTAINING TRADE SECRET:
Companies should consider the following methods to protect trade secrets:
Review all company operations and proprietary information to determine where trade
secrets exist
Use nondisclosure (confidentiality) agreements with all individuals having access to
the trade secrets, including employees, officers, bankers, vendors, etc.
Consider use of noncompetition agreements (covenants not to compete)
A covenant not to compete is a contract clause where a person agrees not to
engage in a specified business or occupation
The covenant will identify the applicable time and geographic region, e.g., the
employee will not leave the company's employ and work in the meat
processing industry for the next two years, within the United States
Examine physical and network security issues:
Restrict access to company trade secrets
Utilize computer passwords, "confidential" stamps/legends, record-keeping
procedures, entrance and exit interviews, etc.
PHYSICAL SECURITY
The first defense for trade secret is the workspace. Following are the check list for workplace
security:
1. Access to the building:
Is the entrance to the building secure?
Companies often require that all employees enter into a confidentiality agreement before
beginning employment. A confidentiality agreement also known as nondisclosure agreement
is a contract that restricts the disclosure of trade secrets. The terms of confidentiality
agreement are sometimes disclosed within an employment agreement.
UNFAIR COMPETITION:
The term unfair competition is a broad term covering a wide variety of deceptive practices in
the market. It includes:
1. Passing off:
It occurs when one party attempts to pass off or sell his or her goods or services as those of
another.
2. Misappropriation:
It exists when one party takes or uses anothers property that the original owner created or
secured at effort and expense.
3. Infringement of the right of publicity:
A persons name, identity, voice, likeness, or character is protected against unauthorized
commercial exploitation through the right of publicity.
4. False advertising:
Making false or deceptive representations about the nature of ones goods or services is
actionable as false advertising.
5. Product disparagement:
Making false representations about nature of another partys goods or services is actionable
as product disparagement.
6. Dilution:
Using anothers famous mar in a way that is likely to cause blurring of its distinctive quality
or tarnishing (ruining) it by harming its reputation is actionable as dilution.
7. Infringement of trade dress:
Adopting the overall concept of anothers distinctive packaging or product image, generally
called its trade dress so as to deceive consumers is an infringement of trade dress.
TRADE SECRET LITIGATION:
Trade secret litigation is usually based upon tow theories. If the secret was acquired by
misappropriation, then there has been a violation of the state trade secret law. If the trade
secret is disclosed in violation of an agreement to maintain secrecy the disclosing party has
breached an agreement.
Misappropriation and improper means
Improper means is defined as the illegal acquisition of trade secrets through theft, bribery,
misrepresentation, breach, or inducement (incentive or encouragement) of a breach of a duty
to maintain secrecy, or espionage (spying or intelligence) through electronic or other means.
Breach of contract
If a party has breached an agreement not to disclose the secret, there has been a breach of
contract. The measure of damages for breach of contract is the amount that will compensate
the aggrieved party for all the detriment (loss or harm) proximately (nearly) caused by the
breach. Similarly, if the disclosure results from a breach of fiduciary duty, the claim would be
for a breach of fiduciary duty rather than a breach of contract.
Applying state law:
Unless a case is brought under economic espionage act, if a trade secret case is brought in
federal court, state trade secret law is used to decide the case. If both the parties are from
same state and the misappropriation occurred in that state the choice of state law is simple. If
the parties are from different states, there are several variables. If there is a written
agreement, such as a nondisclosure agreement, that contract may establish which state law
will apply. If there is no such written agreement regarding disclosure of trade secrets, then the
court will determine which state law should apply. This may be based upon factors such as
relationship of the parties, the domicile of the disclosing party, or locations of
misappropriation.
UNIT - 4
TRADE MARKS
INTRODUCTION TO TRADE MARKS:
A trade mark (popularly known as brand name in laymans language) is a visual symbol
which may be a word to indicate the source of the goods, a signature, name, device, label,
numerals, or combination of colours used, or services, or other articles of commerce to
distinguish it from other similar goods or services originating from another.
A trade mark provides protection to the owner of the mark by ensuring the exclusive right to
use it or to authorize another to use the same in return for payment. The period of protection
varies, but a trade mark can be renewed indefinitely beyond the time limit on payment of
additional fees. Trade mark protection is enforced by the courts, which in most systems have
the authority to block trade mark infringement.
The object of trade mark law is to protect the rights of persons who manufacture and sell
goods with distinct trade marks against invasion by other persons passing off their goods
fraudulently and with counterfeit trademarks as those of the manufacturers.
There are four types of marks:
Functions of Trademarks:
1. They identify one makers goods or services and distinguish them from those offered
by others.
2. They indicate that all goods or services offered under the mark come from a single
producer, manufacturer or source.
3. They indicate that all goods or services offered under the mark are of consistent
quality.
4. They serve as an advertising device so that consumers link a product or service being
offered with a mark.
TRADE MARK REGISTRATION PROCESS:
1. Preparation the application:
Introduction: Once a mark has been selected and evaluated for use and registrability, an
application for registration of the mark should be prepared and filed. The written application
comprises a request for registration, the name of the applicant, the citizenship of the
applicant, the address of the applicant, an identification of the goods and / or services offered
under the mark, a verification or declaration signed by the applicant or agent or attorney, a
filing fee, and the basis for filing the application, namely whether the application is based on
actual use of the mark or the owners intent to use the mark. The application must be in
English. Application must be in letter size paper, typewritten, double spaced with margins of
at least 11/2 inches at the left and top of the pages. The application should be written on only
one side of the paper. There is a provision of filing the application electronically and these
documents are examined more quickly than the manual documents.
Applicant: The application to register a mark can be made only by the owner of the mark or
in the case of intent to use application by a person who has a bona fide intent to use the mark
in commerce. An applicant may be a natural person or business entities. Government entities
such as nations, states, municipalities and other governmental bodies can also apply to
register the marks that they own. The name of the applicant must be in legal form. If the
applicant is a person or business that conducts business under a fictitious business name then
the application must include the same name. In case of business entities the name that is
included in articles of association must be included.
Identification of goods and services: The applicant must identify the goods and services
offered under the mark subject to the application. The goods and services are classified into
45 classes (34 goods and 11 services) called international classes as most of the nations use
the same classes. While filing the application the goods must be identified clearly, accurately
and concise otherwise after filing the application it is not permitted to change the class.
Basis for filing the application and method of use: The application submitted usually specifies
one of the following bases and states the manner in which the mark is used.
Actual use of the mark in commerce, specifying a date of first use in commerce
A bona fide intent to use the mark in commerce
A bona fide intent o use the mark in commerce and a claim that the mark is the subject
on the certificate of registration. The applicant may use any font, bold or italicized letters, an
uppercase and lowercase letters.
A special form drawing is used when applicants seek to register a mark that includes a two or
three dimensional design, color and words, letters, or numbers or a combination in a
particular font style or size.
Specimens: The applicant must submit a proof of mark in commerce by providing specimen
of the mark showing exactly how the mark is seen by the public at the time of application.
For applications filed electronically the applicant must submit a digitalized image of the
specimen in jpg format. For paper applications actual tags, bags, labels and other similar
items are highly preferred photocopies. Advertising material is generally not acceptable as a
specimen for goods. Thus merely including brochure or ad about products such as soap or
clothing is insufficient.
Declaration and signature: The application must be signed by and include a declaration or
verification by the applicant or its agent or attorney. The declaration is a statement placed at
the end of the application whereby the signatory acknowledges that the statements in the
application are true and that the signatory understands that willful false statements are
punishable by fine or imprisonment. If the application is one made by an individual, this
individual will sign the document. If the applicant is a corporation or partnership, the
application is usually signed by an officer of the corporation or a general partner respectively.
The principal and supplemental registers: The application should designate whether the
application seeks registration on the principal register or the supplemental register.
Registration with principal register is preferred because it offers a wider scope of protection
for a mark. Registration on the supplemental register is an indication that a mark does not yet
distinguish but ultimately is capable of distinguishing the applicants goods or services from
those of another.
Differences between principal and supplemental registrations:
Registration on principal register is prima facie evidence of the registrants exclusive right to
use of the mark, registration on the supplemental register has no such evidentiary effect.
Registration on principal register is constructive notice of a claim of ownership so as to
eliminate a defense of good faith in an infringement suit but a supplemental registration has
no such effect.
Registration on the principal register may become incontestable (unquestionable) after five
years of registration but supplemental registration may never achieve that status.
to use the mark or seek its consent to coexistence and registration. The applicant may need to
pay the prior user some amount of money to secure the consent.
Response to office actions
The applicant has six months to respond to an office action. Failure to respond within the
appropriate time period will result in abandonment of the application unless the delay was
unintentional.
7. Post examination procedure
Publication in the official gazette
Assuming the applicant responds satisfactorily to the office action, the examining attorney
will approve the mark for publication in the weekly official gazette. A notice of opposition
must be filed within 30 days of publication of the mark in the official gazette. Extension of
time to oppose may be granted as follows:
A first request for a 30 day extension will be granted without a showing of good
cause. Alternatively, a first request for a 90 day extension will be granted upon a
The applicants petition must state that the delay in responding to the office action or notice
of allowance was unintentional.
8. Registration
For a use based application, a registration will issue about 12 weeks after publication in the
official gazette if no notice of opposition is filed to the application. For an intent to use
application registration will occur after publication in the official gazette notice of allowance
of mark, and submission of the statement of use and requisite specimen and fee. The
application process for use based applications can take 12 to 18 months or longer and the
process for intent to use applications can take from 18 to 42 months or longer. The term of
registration is presently 10 years from the date of mark is registered.
POST REGISTRATION PROCEDURES:
1. Affidavit of use
Background:
Although a registration is valid for 10 years, between years five and six after a registration is
issued and in the year before the end of each 10 year period after registration the registrant is
required to file an affidavit (or declaration) of use with PTO verifying that the mark is still in
use in commerce in connection with the goods or services identified in registration. Failure to
submit the affidavit of use within in the appropriate deadline will lead to cancellation of the
registration.
Changes in ownership of the mark:
Affidavit must be filed by the owner of registration. Often marks are transferred or assigned
to other new owners who fail to notify the PTO of the change in ownership. Even though
affidavit is filed by the new owner and PTO records may continue to reflect original
registrant until appropriate changes are made in the records showing the continuity of tile to
the party now filing the affidavit.
Changes in the mark:
When filing the affidavit, the owner must attach a specimen showing the mark as it is
presently used for each class of goods or services identified in the registration. If the mark as
presently used differs from the mark as registered, the PTO must determine whether the
change is material or not. If the change is determined to be a material alteration, the affidavit
will be refused. If the PTO agrees that a change is not material and accepts the affidavit the
registrant will usually be encouraged to amend the registration so it conforms to the mark as
presently used. If the registered mark is not in use in commerce the owner may provide facts
to the PTO showing that nonuse is excusable due to special circumstances rather than any
intent to abandon the mark. The owner must also state date use of the mark stopped and when
it is expected to resume. If there is governmental regulation that precludes the owner from
using the mark non use would be acceptable.
2. Affidavit of incontestability
Trademarks permit the owners of registrations on principal register to file affidavits whereby
the right to use the registered marks for the goods or services set forth in the affidavit
becomes incontestable (unquestionable). This is not filed until the mark has been in
continuous use in commerce for at least five consecutive years after the date of registration
and the affidavit must state that there has been no final decision adverse to the registrants
claim of ownership of the mark.
3. Renewal of Registrations
Any trademark registration issued has a validity of 10 years.
expiration the registrant must renew the registration or it will be automatically cancelled. A
grace period of six months following the expiration of registration will be given during which
the application of renewal may be filed.
4. Docketing requirements
For proper and timely actions on trademarks details are to be stored properly and most of the
professionals maintain their own docketing systems which will generate automatic messages
for further action.
5. Loss of Trademarks
The mark will be abandoned when either of the following occurs:
The mark has become a generic name i.e., a mark can become generic when
consumers begin to call the product or service offered under the mark by the mark.
whereby the licensor protects the mark by ensuring the goods and services offered under it by
the licensee are consistent with those offered by the licensor. The license agreement should
specify whether the license is an exclusive or nonexclusive license which indicates whether
use is restricted to any specific goods or services or to any geographic territory, and must
include adequate quality control provisions.
Trademarks as collateral:
Trademark owners may use their marks as collateral to secure their promise to perform some
obligation. During the existence of security agreement the owner retains all rights in the
mark. It allows the party to seize the marks only in the event of a default by the owner in
regard to promise or obligation.
Inter parties proceedings:
Inter parties proceedings are those involving disputes between parties regarding rights, use
and ownership of marks. There are four types of inter parties proceedings: oppositions,
cancellations, interferences and concurrent use proceedings.
Oppositions
An opposition is a proceeding initiated by a person who believes that he or she would be
damaged by registration of a mark on the principal register. The document initiating the
proceeding is called notice of opposition. If the parties themselves cannot reach some
resolution an opposition proceeding will be initiated by filing of a notice of opposition. An
opposition must be filed prior to the expiration of the 30 day period after publication of the
mark in official gazette for opposition or within an extension of time of oppose. The most
common reason a person might believe he or she will be damaged if the mark applied for
proceeds to registration is that the mark is confusingly similar to the opposers mark. The
opposer is only required to state why he or she believes registration of the mark in question
would result in the damage. Oppositions can be made on the basis of descriptiveness or that
the mark is a surname, contains immoral or disparaging matter, has been abandoned, is likely
to dilute anothers trademark. As soon as the notice of opposition or request for extension of
time to oppose is filed the examining attorney at PTO relinquishes the file to Trademark Trial
and Appeal Board (TTAB), which will handle the matter until its conclusion. The TTAB can
suspend an opposition proceeding to allow the parties to engage in settlement discussions.
Cancellations
Cancellation proceedings may be initiated after a mark is registered. Any person who believes
that he or she will be damaged by the continued existence of registration may petition to
cancel the registration. If the mark is on the principal register the petition to cancel must be
filed within five years of the registration date if the grounds are those that would have
justified denial of registration to begin with.
The petition to cancel must be set forth a short and plain statement of the reasons for the
petitioners belief that he or she will be damaged by continued registration of the mark, state
the grounds for cancellation and identify the owner of the registration so a copy of petition
can be forwarded to the owner. The petition to cancel must be brought by one who believes
he or she will be damaged by registration of the mark. The most common grounds asserted in
a petition to cancel are the ones that must be brought within five years of registration that the
mark is merely descriptive, it is confusingly similar to another mark or it has been
abandoned.
A copy of petition to cancel is a short and plain statement of the reasons for the petitioners
belief that he or she will be damaged by continued registration of the mark, state the grounds
for cancellation and identify the owner of the registration so a copy of the petition can be
forwarded to the owner.
Just as the notices of opposition petitions to cancel must be brought by one who believes he
or she will be damaged by registration of the mark. The most common grounds asserted in a
petition to cancel are the ones that must be brought within five years of registration and the
mark is merely descriptive, it is confusingly similar to another mark or it has been
abandoned. The proceedings are similar to those of the oppositions.
Interferences
If two pending applications conflict or if a pending application conflicts with an existing
registration the patent and trademark office may declare an interference. Interferences are rare
proceedings and occur only upon a showing of extraordinary circumstances. Typically, if
marks conflict, the parties resolve their differences by way of an opposition or cancellation.
When an opposition or cancellation proceeding is unavailable to a party or will not
adequately protect a party may a party request an interference proceeding.
Concurrent use proceedings
If parties use similar marks in different geographical areas a concurrent use proceeding may
be initiated. These parties used their marks in their respective areas in good faith and without
knowledge of the others existence. In this application a party requests that the registration
that will ultimately issue be restricted geographically so that on its face the registration will
state that the owner has the right to use the mark in certain identified states, cities or regions.
INFRINGEMENT:
If any person uses trademark without the registrants consent a mark that is likely to cause
confusion with the registrants mark the law provides the owner of registered mark to take
civil action in the court of law for infringement of trademark. To prevail on a trademark
infringement claim a marks owner must prove two things: mark has priority and that the
infringers mark is likely to cause confusion.
Standard for determining the likelihood of confusion
commercial impression
The similarity of the goods or services offered under the marks
The similarity in the channels of trade in which the goods or services are offered
The conditions under which sales are made namely whether the purchases are made
portion of the mark and give less weight to common or descriptive elements.
When marks comprise both words and designs, greater weight is sometimes given to
the wording which would be used by consumers in requesting the goods or services
If an owner has a famous mark or a family of marks that has achieved public
recognition the mark may be more likely to be infringed.
In determining likelihood of confusion courts consider to what extent the parties respective
goods or services are distributed through the same trade channels and advertised in the same
media.
Defenses of infringement
The defendant may assert that an abandonment of plaintiffs rights in the mark has
occurred through non use prior to the time the defendant began using the mark or
A defense may be raised that the mark is merely descriptive and that it has not
such a serious wrongful act that relief should not be awarded to it.
The defendant might assert laches namely the plaintiff delayed an unreasonable
amount of time to bring the action and this delay has prejudiced the defendant.
The defendant may allege the mark is functional and thus unprotectable.
The defendant might allege that its use is a mere parody and is protected by the first
amendment.
The defendant may assert that its use was a fair use meaning that it did not use the
plaintiffs name or mark as a trademark but merely to describe its goods in a general
fashion.
Remedies of infringement
A plaintiff who is successful in proving trademark infringement might obtain a variety of
remedies including the following:
An injunction preventing the defendant from further use of the confusingly similar
mark, ordering an infringer to disable an offending website or ordering the defendant
to a print a notice on its goods that it is not affiliated with the plaintiff
Monetary damages to compensate the plaintiff for the damage it has suffered,
including actual damages due to lost sales and injury to its reputation and goodwill
An unauthorized copy;
Not conforming to the original manufacturers design, model, and/or performance
standards;
Unfair competition
Any act of competition contrary to honest practices in industrial and commercial matters Paris Convention Art.
Focus: consumer protection
Misleading advertising
Aggressive advertising = Undue influence on consumers
Cold calling, e-mail spamming, etc. (some jurisdictions only)
Focus: protection of trade values:
Damaging goodwill
Exploiting goodwill
Interference with contractual relations
Misappropriation of trade secrets
Product imitation
Customs regulation
Additional protection is provided to the trademark owners through customs regulations. That
is the registered trademark owners have to deposit their certificates of registration with the
Customs and Border .protection service in order to block importation of offending goods.
Posting of Ports means that CBP will monitor ports of entry into the country and will seize
any unpermitted goods bearing the owners mark. Criminal sanctions may be posed on the
offending party.
TRADE MARKS LITIGATION:
Trademark litigation is often intended to halt the infringing activity, not to collect damages.
The goal of trademark litigation may be to aggressively expand its proprietary rights by
forcing others to stop using its marks. The parties in litigation are governed by rules of civil
Through the Madrid System there is no need to pay for translations into multiple languages or
to spend extra time working through the administrative procedures of multiples offices.
Broad geographic coverage
The Madrid System offers the potential for simultaneous protection in up to 111 territories of
its 95 members, including the European Union (EU) and African Intellectual Property
Organization (OAPI), the majority of developed countries and many developing and
transition countries.
UNIT -6
CYBER LAW
INTRODUCTION TO CYBER LAW:
What is Cyber Law? Cyber Law is the law governing cyber space. Cyber space is a very wide
term and includes computers, networks, software, data storage devices (such as hard disks,
USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones,
ATM machines etc. Law encompasses the rules of conduct: 1. that have been approved by the
government, and 2. which are in force over a certain territory, and 3. which must be obeyed
by all persons on that territory. Violation of these rules could lead to government action such
as imprisonment or fine or an order to pay compensation.
Cyber law encompasses laws relating to:
1. Cyber Crimes
2. Electronic and Digital Signatures
3. Intellectual Property
4. Data Protection and Privacy
Cyber crimes are unlawful acts where the computer is used either as a tool or a target or both.
The enormous growth in electronic commerce (e-commerce) and online share trading has led
to a phenomenal spurt in incidents of cyber crime. These crimes are discussed in detail
further in this chapter. A comprehensive discussion on the Indian law relating to cyber crimes
and digital evidence is provided in the ASCL publication titled Cyber Crimes & Digital
Evidence Indian Perspective.
Electronic signatures are used to authenticate electronic records. Digital signatures are one
type of electronic signature. Digital signatures satisfy three major legal requirements signer
authentication, message authentication and message integrity. The technology and efficiency
of digital signatures makes them more trustworthy than hand written signatures. These issues
are discussed in detail in the ASCL publication titled Ecommerce Legal Issues.
Intellectual property is refers to creations of the human mind e.g. a story, a song, a painting,
a design etc. The facets of intellectual property that relate to cyber space are covered by cyber
law.
These include:
copyright law in relation to computer software, computer source code, websites, cell phone
content etc,
software and source code licences
trademark law with relation to domain names, meta tags, mirroring, framing, linking etc
8. A software source code worth crores of rupees or a movie can be pirated across the globe
within hours of their release.
9. Theft of corporeal information (e.g. books, papers, CD ROMs, floppy disks) is easily
covered by traditional penal provisions. However, the problem begins when electronic
records are copied quickly, inconspicuously and often via telecommunication facilities. Here
the original information, so to say, remains in the possession of the owner and yet
information gets stolen.
INFORMATION TECHNOLOGY ACT:
Enacted on 17th May 2000- India is 12th nation in the world to adopt cyber laws
IT Act is based on Model law on e-commerce adopted by UNCITRAL
Objectives of the IT Act
To provide legal recognition for transactions: Carried out by means of electronic data interchange, and other means of electronic
communication, commonly referred to as "electronic commerce
To facilitate electronic filing of documents with Government agencies and EPayments
To amend the Indian Penal Code, Indian Evidence Act,1872, the Bankers Books
Evidence Act 1891,Reserve Bank of India Act ,1934
Extent of application
Extends to whole of India and also applies to any offence or contravention there under
committed outside India by any person {section 1 (2)} read with Section 75- Act
applies to offence or contravention committed outside India by any person
irrespective of his nationality, if such act involves a computer, computer system or
network located in India
Section 2 (1) (a) Access means gaining entry into ,instructing or communicating
with the logical, arithmetic or memory function resources of a computer, computer
resource or network
Definitions ( section 2)
"computer" means electronic, magnetic, optical or other high-speed date processing
device or system which performs logical, arithmetic and memory functions by
manipulations of electronic, magnetic or optical impulses, and includes all input,
output, processing, storage, computer software or communication facilities which are
connected or relates to the computer in a computer system or computer network;
"computer network" means the inter-connection of one or more computers through (i) the use of satellite, microwave, terrestrial lime or other communication media; and
(ii) terminals or a complex consisting of two or more interconnected computers
whether or not the interconnection is continuously maintained;
"computer system" means a device or collection of devices, including input and
output support devices and excluding calculators which are not programmable and
capable being used in conjunction with external files which contain computer
programmes, electronic instructions, input data and output data that performs logic,
arithmetic, data storage and retrieval, communication control and other functions;
"data" means a representation of information, knowledge, facts, concepts or
instruction which are being prepared or have been prepared in a formalised manner,
and is intended to be processed, is being processed or has been processed in a
computer system or computer network, and may be in any form (including computer
printouts magnetic or optical storage media, punched cards, punched tapes) or stored
internally in the memory of the computer.
"electronic record" means date, record or date generated, image or sound stored,
received or sent in an electronic form or micro film or computer generated micro
fiche;
secure system means computer hardware, software, and procedure that(a)
(d)
Trojans come in two parts, a Client part and a Server part. When the victim (unknowingly)
runs the server on its machine, the attacker will then use the Client to connect to the Server
and start using the trojan.
TCP/IP protocol is the usual protocol type used for communications, but some functions of
the trojans use the UDP protocol as well.
c. Virus and Worm attack:A program that has capability to infect other programs and make copies of itself and spread
into other programs is called virus.
Programs that multiply like viruses but spread from computer to computer are called as
worms.
d. E-mail & IRC related crimes:1. Email spoofing
Email spoofing refers to email that appears to have been originated from one source when it
was actually sent from another source. Please Read
2. Email Spamming
Email "spamming" refers to sending email to thousands and thousands of users - similar to a
chain letter.
3 Sending malicious codes through email
E-mails are used to send viruses, Trojans etc through emails as an attachment or by sending a
link of website which on visiting downloads malicious code.
4. Email bombing
E-mail "bombing" is characterized by abusers repeatedly sending an identical email message
to a particular address.
5. Sending threatening emails
6. Defamatory emails
7. Email frauds
8. IRC related
Three main ways to attack IRC are: "verbal8218;?#8220; attacks, clone attacks, and flood
attacks.
e. Denial of Service attacks:Flooding a computer resource with more requests than it can handle. This causes the resource
to crash thereby denying access of service to authorized users.
Examples include
attempts to "flood" a network, thereby preventing legitimate network traffic
attempts to disrupt connections between two machines, thereby preventing access to a service
attempts to prevent a particular individual from accessing a service
attempts to disrupt service to a specific system or person.
Distributed DOS
A distributed denial of service (DoS) attack is accomplished by using the Internet to break
into computers and using them to attack a network.
Hundreds or thousands of computer systems across the Internet can be turned into zombies
and used to attack another system or website.
Types of DOS
There are three basic types of attack:
a. Consumption of scarce, limited, or non-renewable resources like NW bandwith,
RAM, CPU time. Even power, cool air, or water can affect.
b. Destruction or Alteration of Configuration Information
c. Physical Destruction or Alteration of Network Components
e. Pornography:The literal mining of the term 'Pornography' is describing or showing sexual acts in order to
cause sexual excitement through books, films, etc.
This would include pornographic websites; pornographic material produced using computers
and use of internet to download and transmit pornographic videos, pictures, photos, writings
etc.
Adult entertainment is largest industry on internet.There are more than 420 million individual
pornographic webpages today.
Research shows that 50% of the web-sites containing potentially illegal contents relating to
child abuse were Pay-Per-View. This indicates that abusive images of children over Internet
have been highly commercialized.
Pornography delivered over mobile phones is now a burgeoning business, driven by the
increase in sophisticated services that deliver video clips and streaming video, in addition to
text and images.
Effects of Pornography
Research has shown that pornography and its messages are involved in shaping attitudes and
encouraging behavior that can harm individual users and their families.
Pornography is often viewed in secret, which creates deception within marriages that can lead
to divorce in some cases.
In addition, pornography promotes the allure of adultery, prostitution and unreal expectations
that can result in dangerous promiscuous behavior.
Some of the common, but false messages sent by sexualized culture.
Sex with anyone, under any circumstances, any way it is desired, is beneficial and does not
have negative consequences.
Women have one value - to meet the sexual demands of men.
Marriage and children are obstacles to sexual fulfillment.
Everyone is involved in promiscuous sexual activity, infidelity and premarital sex.
Pornography Addiction
Dr. Victor Cline, an expert on Sexual Addiction, found that there is a four-step progression
among many who consume pornography.
1.Addiction: Pornography provides a powerful sexual stimulant or aphrodisiac effect,
followed by sexual release, most often through
masturbation.
2.Escalation: Over time addicts require more explicit and deviant material to meet their
sexual "needs."
3.Desensitization: What was first perceived as gross, shocking and disturbing, in time
becomes common and acceptable.
4.Acting out sexually: There is an increasing tendency to act out behaviors viewed in
pornography.
g. Forgery:Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using
sophisticated computers, printers and scanners.
Also impersonate another person is considered forgery.
h. IPR Violations:These include software piracy, copyright infringement, trademarks violations, theft of
computer source code, patent violations. etc.
Cyber Squatting- Domain names are also trademarks and protected by ICANNs domain
dispute resolution policy and also under trademark laws.
Cyber Squatters registers domain name identical to popular service providers domain so as
to attract their users and get benefit from it.
i. Cyber Terrorism:Targeted attacks on military installations, power plants, air traffic control, banks, trail traffic
control, telecommunication networks are the most likely targets. Others like police, medical,
fire and rescue systems etc.
Cyberterrorism is an attractive option for modern terrorists for several reasons.
1.It is cheaper than traditional terrorist methods.
2.Cyberterrorism is more anonymous than traditional terrorist methods.
3.The variety and number of targets are enormous.
Research shows that number of people employed in this criminal area. Daily peoples
receiving so many emails with offer of banned or illegal products for sale.
m. Online gambling:There are millions of websites hosted on servers abroad, that offer online gambling. In fact, it
is believed that many of these websites are actually fronts for money laundering.
n. Defamation: Defamation can be understood as the intentional infringement of another person's right to his
good name.
Cyber Defamation occurs when defamation takes place with the help of computers and / or
the Internet. E.g. someone publishes defamatory matter about someone on a website or sends
e-mails containing defamatory information to all of that person's friends. Information posted
to a bulletin board can be accessed by anyone. This means that anyone can place
Cyber defamation is also called as Cyber smearing.
Cyber Stacking:Cyber stalking involves following a persons movements across the Internet by posting
messages (sometimes threatening) on the bulletin boards frequented by the victim, entering
the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc.
In general, the harasser intends to cause emotional distress and has no legitimate purpose to
his communications.
p. Pedophiles:Also there are persons who intentionally prey upon children. Specially with a teen they will
let the teen know that fully understand the feelings towards adult and in particular teen
parents.
They earns teens trust and gradually seduce them into sexual or indecent acts.
Pedophiles lure the children by distributing pornographic material, then they try to meet them
for sex or to take their nude photographs including their engagement in sexual positions.
q. Identity Theft :Identity theft is the fastest growing crime in countries like America.
Identity theft occurs when someone appropriates another's personal information without their
knowledge to commit theft or fraud.
Identity theft is a vehicle for perpetrating other types of fraud schemes.
r. Data diddling:Data diddling involves changing data prior or during input into a computer.
In other words, information is changed from the way it should be entered by a person typing
in the data, a virus that changes data, the programmer of the database or application, or
anyone else involved in the process of having information stored in a computer file.
It also include automatic changing the financial information for some time before processing
and then restoring original information.
s. Theft of Internet Hours:Unauthorized use of Internet hours paid for by another person.
By gaining access to an organisation's telephone switchboard (PBX) individuals or criminal
organizations can obtain access to dial-in/dial-out circuits and then make their own calls or
sell call time to third parties.
Additional forms of service theft include capturing 'calling card' details and on-selling calls
charged to the calling card account, and counterfeiting or illicit reprogramming of stored
value telephone cards.
t. Theft of computer system (Hardware):-
This type of offence involves the theft of a computer, some part(s) of a computer or a
peripheral attached to the computer.
u. Physically damaging a computer system:Physically damaging a computer or its peripheralseither by shock, fire or excess electric
supply etc.
v. Breach of Privacy and Confidentiality
Privacy
Privacy refers to the right of an individual/s to determine when, how and to what extent his or
her personal data will be shared with others.
Breach of privacy means unauthorized use or distribution or disclosure of personal
information like medical records, sexual preferences, financial status etc.
Confidentiality
It means non disclosure of information to unauthorized or unwanted persons.
In addition to Personal information some other type of information which useful for business
and leakage of such information to other persons may cause damage to business or person,
such information should be protected.
Generally for protecting secrecy of such information, parties while sharing information forms
an agreement about he procedure of handling of information and to not to disclose such
information to third parties or use it in such a way that it will be disclosed to third parties.
Many times party or their employees leak such valuable information for monitory gains and
causes breach of contract of confidentiality.
Special techniques such as Social Engineering are commonly used to obtain confidential
information
DATA SECURITY & CONFIDENTIALITY:
The 1998 Data Protection Act came into force on 1 March 2000. The purpose of the Act is to
protect the rights of individuals about whom data (information) is obtained, stored, processed
and disclosed.
What is data protection?
Data protection is essentially that area of the law that governs what may, and what may not,
be done with personal information. Such personal information may be in electronic (eg
stored on computer hard drive) or manual form (in a manual filing system).
The law
The Data Protection Act is mandatory and Law Centre (NI) is therefore required under law to
comply with the Act. This means that we must:
Staff can be criminally liable if they knowingly or recklessly disclose personal data in
breach of the Act.
A serious breach of data protection is also a disciplinary offence and will be dealt with
under the Law Centres disciplinary procedures. If a member of staff accesses another
employees personnel records without authority this constitutes a gross misconduct
offence and could lead to summary dismissal.
2. Policy Statement
Law Centre (NI) is committed to fulfilling its legal obligations within the provisions of the
Data Protection Act.
3. Notification
The Information Commissioner maintains a public register of data controllers who process
data (information) and who are required to notify their details to the Commissioner. Law
Centre (NI) has notified the Information Commissioner of the types of processing we
undertake since 1996 and have been placed on the register.
4. The Eight Data Protection principles
There are eight principles of data (information) processing with which the data controller
must ensure compliance. In this instance the Law Centre is the data controller.
Personal data shall be:
Principle 1: processed fairly and lawfully
Principle 2: obtained only for the purpose stated
Principle 3: adequate, relevant and not excessive
Principle 4: accurate and, where necessary, kept up-to-date
Principle 5: not be kept for longer than is necessary for that purpose
Principle 6: processed in accordance with the rights of data subjects under the Act
Principle 7: appropriate technical and organisational measures shall be taken against
unauthorised or unlawful processing
Employment records
Monitoring at work
The Administration Manager (Belfast) has the responsibility for the implementation of these
codes.
6. Compliance with data protection principles
Principle 1: Processed fairly and lawfully
This means that when Law Centre (NI) is collecting personal information from individuals:
individual consent has been obtained for any secondary uses of their personal
information
clients
personnel
training participants
mailing lists
Political opinion
Sexual life
Law Centre (NI) processes sensitive data for the following purposes:
Advice/legal proceedings
Legal rights
Staff administration
Fundraising
Similarly, third parties who supply personal information to the Law Centre should advise the
Law Centre of any corrections or amendments that need to be made.
The significance of the inaccuracy is important, obviously minor inaccuracies which have no
impact are of less importance but nevertheless the validity of the system and the training and
skills of staff inputting data should be checked.
Any inaccuracies should be corrected as soon as possible in order to limit the damage and
distress caused.
Any information should include the source and date and any alterations should be dated.
Principle 5: Not kept longer than is necessary
Law Centre (NI) will ensure that personal information is not retained any longer than is
necessary. This will require the Law Centre to undertake regular assessment and deletion.
We are legally obliged to keep client files and financial records for a period of six years
Principle 6: Processed in accordance with the rights of data subjects under the Act
Individuals have a general right of access to their own personal information, which is
processed by Law Centre (NI) in accordance with established Law Centre Access
procedures. They have the right:
Claim compensation
Privacy is one of the most complex legal issues facing e-commerce ventures today. Many
sites, such as the one in our case study, have little interest in actively profiling their users or
discovering personal information about them. However, these sites will often collect
significant amounts of personally identifiable data that may trigger liability risks.
Our task in this section is to assess the liability risk of a site's information collection
practices. We can break this task down into four main steps. First, we must determine what
information is collected by the site. Second, we must evaluate the potential liability for those
information collection practices. Third, we must choose whether to develop a privacy policy
to disclose those practices. And, fourth, we must verify our compliance with statutes or
regulations.
Information Collection
Many e-commerce sites directly ask users for personal information through forms. However,
in addition to such information, many sites also record data about their users' browsing
habits. This data can be matched with personal and demographic information to create a
profile of user preferences. Sites might use these profiles to target advertising or offer
customized services.
Automatic software logs and third-party cookie placements are two of the most easily
overlooked aspects of information collection. Many sites have no interest in actively profiling
their customers and might even insist to their counsel that they collect no personal
information. But most of these sites do collect information automatically through their server
software, and many allow third-party cookie placement.
COMMON TECHNOLOGIES
Cookies
Cookies collect information as a user surfs the web and feed the information back to a web
server. An online vendor's site will send cookies (which is most simply an identification
number) to a user's computer, where it is stored in a file on the user's hard drive and serves as
a digital identifier tag that notifies the vendor whenever that user re-enters the vendor's
website.
Cookies have two main uses. First, by allowing the site to "remember" the user, they can
customize a website by producing special content targeted to a specific user. Second, cookies
are used by network advertising agencies, such as DoubleClick, to target product
advertisements based on long-term profiles of users' buying and surfing habits.
Web bugs (or pixel tags)
Web bugs are images--usually invisible because they are only one pixel wide by one pixel
high--that are embedded in web pages and HTML-formatted emails. Advertising networks
often use web bugs on web pages to add information to personal profiles stored in cookies
and to collect statistics about how many hits the site gets.
Liability for Online Profiling
Although the FTC has recommended legislation to regulate online profiling (Website) (FTC,
2000), current American privacy law contains almost no general prohibitions against the
collection of consumer data. Today, most privacy initiatives target specific industries or types
of data, such as consumer credit reports, cable TV subscriber information, or personal
financial information. SeeProtected Categories for more information.
Electronic Communications Privacy Act (ECPA)
The ECPA, imposes civil and criminal penalties for the intentional interception, disclosure,
or use of electronic communications that affect interstate or foreign commerce. Electronic
communications are defined as any transfer of information by means of wire or
electromagnetic system. The major obstacle to using the ECPA to restrict online profiling is
that it exempts parties from liability if they obtain the prior consent from "users" or "parties
to communication".
Common-law Privacy Tort
The common law doctrine of personal privacy includes four grounds for tort liability
1. Unreasonable intrusion upon the seclusion of another
"One who intentionally intrudes, physically or otherwise, upon the solitude or seclusion of
another or his private affairs or concerns, is subject to liability to the other for invasion of his
privacy, if the intrusion would be highly offensive to a reasonable person."
2. Unreasonable publicity given to another's private life
"One who gives publicity to a matter concerning the private life of another is subject to
liability to the other for the invasion of his privacy, if the matter publicized is of a kind that
(a) would be highly offensive to a reasonable person, and (b) is not of legitimate concern to
the public."
3. Publicity that unreasonably places another in a false light before the public
"One who gives publicity to a matter concerning another that places the other before the
public in a false light is subject to liability to the other for invasion of privacy, if (a) the false
light in which the other was placed would be highly offensive to a reasonable person, and (b)
the actor had knowledge of or acted in reckless disregard as to the falsity of the publicized
matter and the false light in which the other would be placed."
4. The appropriation of another's name or likeness
"One who appropriates to his own use or benefit the name or likeness of another is subject to
liability to the other for invasion of his privacy."
Developing A Privacy Policy
Under current law, companies are not legally obligated to post privacy policies. Indeed,
privacy policies may actually put companies at legal risk. The FTC has investigated and sued
companies for failure to comply with their stated policies. Moreover, once a partial disclosure
of information practice has been made, companies may even face an obligation to fully
disclose all privacy practices.
Privacy Audit
The first step is to conduct a privacy audit to decide what information will be collected, how
it will be used, and whether it will be shared with outside parties.
Privacy policies should be drafted in plain and direct English. If the site targets
consumers in non-English-speaking nations, translations should be available.
Companies must decide whether they will allow users to access their data, correct
inaccuracies, or remove information they do not wish disclosed. Companies benefit from
accurate customer information, and user access can improve customer service by ensuring
that goods are properly shipped or customers receive information that most accurately
matches their interests. However, the consumer access to data may require additional
expenses, computing resources, and personnel. Online access may not always be feasible,
particularly for companies that store more sensitive data such as medical information. In such
cases, written mail might be more appropriate.
4. Data security and integrity
Where appropriate, are there measures to ensure that data is stripped of personally
identifying information?
If consumers feel that their privacy has been violated, how should they contact the
company? What steps will the company take to resolve those issues?
Are there ongoing assessment procedures? Are the results publicly disclosed?
6. Revision of policy
To provide notice to consumers, the privacy policy should be posted prominently. In the
matter of GeoCities, the FTC developed a list of requirements for adequate notice:
A clear and prominent hyperlink or button labeled "PRIVACY NOTICE" on the home
page, which directly links to the privacy policy;
Clear and prominent display of the elements of the policy with a button that must be
clicked on at the bottom of the screen to make it disappear; and
A clear and prominent hyperlink to the privacy policy at each location where personal
identifying information is collected, along with the following statement in bold
typeface: "NOTICE: We collect personal information on this site. To learn more about
how we use your information, click here."
General audience websites with actual knowledge of personal data collected from
children under 13
If a site satisfies either of these descriptions, personal information cannot be collected from
children without parental consent. COPPA also imposes other restrictions requiring notice,
parental access to information and the option to change it, the ability to opt-out of future
information collection, and assurances of information security.
INTERNATIONAL ASPECTS OF COMPUTER AND ONLINE CRIME:
With the explosive growth of computer use around the globe and more people gaining access
to and using the World Wide Web, computer-based frauds and financial crimes are
increasingly likely to have international dimensions. In most cases the legal environment for
computer-based crimes is different in every county.
extraditing suspects from around the globe present additional challenges. Finally, due to
differing privacy rights of individual in the various jurisdictions of the world makes securing
electronic evidence of computer-based frauds, financial crimes and other criminal acts very
difficult.
PRINCIPLES TO COMBAT HIGH-TECH CRIME
I.
II.
III.
IV.
V.
VI.
VII.
VIII.
IX.
X.
There must be no safe havens for those who abuse information technologies.
Investigation and prosecution of international high-tech crimes must be coordinated
among all concerned States, regardless of where harm has occurred.
Law enforcement personnel must be trained and equipped to address high-tech
crimes.
Legal systems must protect the confidentiality, integrity, and availability of data and
systems from unauthorized impairment and ensure that serious abuse is penalized.
Legal systems should permit the preservation of and quick access to electronic data,
which are often critical to the successful investigation of crime.
Mutual assistance regimes must ensure the timely gathering and exchange of
evidence in cases involving international high-tech crime.
Transborder electronic access by law enforcement to publicly available (open source)
information does not require authorization from the State where the data resides.
Forensic standards for retrieving and authenticating electronic data for use in
criminal investigations and prosecutions must be developed and employed.
To the extent practicable, information and telecommunications systems should be
designed to help prevent and detect network abuse, and should also facilitate the
tracing of criminals and the collection of evidence.
Work in this area should be coordinated with the work of other relevant international
fora to ensure against duplication of efforts.
UNIT -1
INTELLECTUAL PROPERTIES
INTRODUCTION TO INTELLECTUAL PROPERTY LAW:
Intellectual property Right (IPR) is a term used for various legal entitlements which attach to
certain types of information, ideas, or other intangibles in their expressed form. The holder of
this legal entitlement is generally entitled to exercise various exclusive rights in relation to
the subject matter of the Intellectual Property. The term intellectual property reflects the idea
that this subject matter is the product of the mind or the intellect, and that Intellectual
Property rights may be protected at law in the same way as any other form of property.
Intellectual property laws vary from jurisdiction to jurisdiction, such that the acquisition,
registration or enforcement of IP rights must be pursued or obtained separately in each
territory of interest. Intellectual property rights (IPR) can be defined as the rights given to
people over the creation of their minds. They usually give the creator an exclusive right over
the use of his/her creations for a certain period of time.
EVOLUTIONARY PAST:
The need for international protection of IP became evident when foreign exhibitors refused to
attend the International Exhibition of Inventions in Vienna in 1873 because they were afraid
their ideas would be stolen.
1883 - Paris Convention for the Protection of Industrial Property, the first major international
treaty designed to help the people of one country obtain protection in other countries for their
intellectual creations in the form of industrial property rights. It entered into force in 1884
with 14 States, which set up an International Bureau to carry out administrative tasks, such as
organizing meetings of the member States.
In 1886 - the Berne Convention for the Protection of Literary and Artistic Works. The aim of
this Convention was to help nationals of its member States obtain international protection of
their right to control, and receive payment for, the use of their creative works such as: novels,
short stories, poems, plays; songs, operas, musicals, sonatas; and
drawings, paintings,
filing date)
Copyright protects the expression of literary or artistic work.
Protection arises automatically giving the holder the exclusive
Trademarks
Design
Database
elements.
Database right prevents copying of substantial parts of a
database. The protection is not over the form of expression of
information but of the information itself, but in many other
Trade
secrets
of
Industrial
Policy
and
Promotion (DIPP)
The Department of Industrial Policy and Promotion under the Ministry of
Commerce & Industry is responsible for Intellectual Property Rights relating to
Patents, Designs, Trade Marks and Geographical Indication of Goods and oversees
the initiative relating to their promotion and protection. These include the outlining of
policy and its implementation through the Office of the Controller General of Patents,
Designs and Trade Marks. It promotes awareness regarding protection of the
Intellectual Property Rights inherent in industrial property in conjunction with the
World Intellectual Property Organization (WIPO) and apex industry organizations
apart from similar initiatives involving regional industry associations. It also provides
inputs on various issues relating to the Agreement on Trade Related Aspects of
Intellectual Properties (TRIPS) related to World Trade Organization (WTO) in
these fields. The Department undertakes technical cooperation programmes with the
World Intellectual Property Organization (WIPO), Geneva for the modernization and
up gradation of intellectual property administration relating to patents, designs,
trademarks and geographical indications and the organization of Human Resource
Development
and
awareness
generation
activities
in
the
country.
has also gone up to 14,119 in 2006-07 against the figure of 2824 in the year 19992000. A total of 7359 patents have been granted in 2006-07.
2. Ministry of Human Resource Development (HRD) Department of Secondary &
Higher Education
Copyright Act
The Copyright Office under the Department of Secondary and Higher Education in
the Ministry of Human Resource Development has taken several measures to
strengthen the enforcement of copyright. These include setting up of Copyright
Enforcement Advisory Council, organization of seminars/workshops to create greater
awareness about copyright law among the enforcement personnel and the general
public, setting up of collective administration societies and creation of separate cells
in state police headquarters. The States and Union Territories of Assam, Goa, Gujarat,
Haryana, Jammu & Kashmir, Karnataka, Kerala, Madhya Pradesh, Maharashtra,
Meghalaya, Orissa, Rajasthan, Sikkim, Tamil Nadu, West Bengal, Andaman &
Nicobar Islands, Chandigarh, Dadra & Nagar Haveli and Daman & Diu have either
set up copyright enforcement cells or special cells in the Crime Branch to look after
copyright offence cases.
In order to facilitate proper coordination between the industry and the enforcement
agencies in the matter of enforcement of copyright laws, the Ministry requested the
State Governments to designate nodal officers. The States of Andhra Pradesh, Goa,
Haryana, Karnataka, Kerala, Madhya Pradesh, Maharashtra, Rajasthan, Tripura, Uttar
Pradesh and West Bengal and the Union Territories of Chandigarh, Daman & Diu,
Lakshadweep and Pondicherry have designated nodal officers.
The Copyright Enforcement Advisory Council (CEAC) was set up on November 6,
1991 to review the progress of enforcement of the Copyright Act periodically and to
advise the government regarding measures for improving the enforcement of the Act.
The term of Copyright Enforcement Advisory Committee is 3 years. The CEAC is
reconstituted after periodically after expiry of the term. The current CEAC has been
reconstituted
on
22nd
February,
2005
for
period
of
years.
The Copyright (Amendment) Act, 1994 provides for setting up separate Copyright
Societies for different categories of works. So far four Copyright Societies have been
registered: one each for cinematograph films (Society for Copyright Regulation of
Indian Producers of Films and Television, SCRIPT), musical works (Indian
Performing Right Society Limited, IPRS) and sound recordings (Phonographic
Performance Limited, PPL) and the last one recently established is the Indian
Reprographic Rights Organization (IRRO) for books/literature/artistic photocopy
rights. These societies have been actively participating in generating awareness about
Copyright and IPR issues. They also have set up their own Anti Piracy Cells which
in collaboration with Police/Enforcement authorities have been actively engaged in
curbing piracy in musical/sound recording works. Department of Secondary and
Higher Education interacts frequently with these Copyright Societies and encourages
them
to
be proactive
in
the
field
of
Copyright
Administration.
for rice, wheat, millet, maize, sorghum, pigeon pea, black gram and green gram.
Details are available at www.plantauthority.in.
4. Ministry of Information Technology Semiconductor Integrated Circuits LayoutDesign Registry (SICLDR)
The Semiconductor Integrated Circuits Layout-Design Registry (SICLDR) for
receiving IPR applications and granting Registrations to qualifying cases has been
set up in the Department of Information Technology, Electronics Niketan, 6 CGO
Complex, Lodi Road New Delhi Frequently Asked Questions on Semiconductor
Integrated Circuits Layout-Design Act, 2000 are at www.mit.gov.in.
5. Ministry of Finance Central Board of Excise and Customs
The Indian Customs has issued a notification No 49/2007-Customs
dated 8-5-
2007 which prohibits import of goods infringing intellectual property rights of the
right holders under the Copyright Act, 1957, the Trade Marks Act, 1999, the
Patents Act, 1970, the Designs Act, 2000 and the Geographical Indications of Goods
(Registration and Protection) Act, 1999. Besides, the procedure for registration of a
notice with the Customs by right holders and the conditions for such registration, etc.
have been laid down in the Intellectual Property Rights (Imported Goods)
Enforcement Rules, 2007 notified under notification 47/2007-Customs (NT) dated the
8th May,2007 (hereinafter referred to as the said Rules). The said Rules lay down a
detailed procedure to be followed by the right holders or their authorized
representatives as also by the Customs for seeking suspension of release of suspect
imported goods.
It is pertinent to mention that while the mandatory obligations under Articles 51 to 60
of the TRIPS dealing with border measures are restricted to Copyright and Trade
Marks infringement only, the above Rules deal with Patents, Designs and
Geographical Indications violations as well, in conformity with the practice
prevailing in some other countries, notably EU countries. The notification states that
while it is not difficult for Customs officers to determine Copyright and Trade Marks
infringements at the border based on available data/inputs, it may not be so in the case
of the other three violations, unless the offences have already been established by a
judicial pronouncement in India and the Customs is called upon or required to merely
implement such order. In other words, extreme caution needs to be exercised at the
time of determination of infringement of these three intellectual property rights.
INFRINGEMENT:
Infringement is a legal term for an act that means breaking a law. IP rights are infringed
when a product, creation or invention protected by IP laws are exploited, copied or otherwise
used without having the proper authorisation, permission or allowance from the person who
owns those rights or their representative.
It can range from using technology protected by a patent to selling counterfeit
medicines/software or copying a film and making it available online.
All of these acts will constitute a civil infringement but some copyright and trade mark
infringements may also be a criminal offence such as the sale of counterfeits including
clothing.
1.3. How will action be taken against you
Trading standards are primarily responsible for enforcing the criminal IP laws, with support
from the police, and with investigative assistance from the IP rights owners. Private criminal
investigations and prosecutions may also be launched by the right owners in some cases.
Criminal IP offences may be taking place in your workplace in a variety of ways. These
include:
employees selling copies of protected works or supplying fake goods within the
working environment
company servers and equipment being used to make available (i.e. uploading)
infringing content to the internet with the knowledge of management
using the work intranet to offer for sale infringing products to colleagues
external visitors entering your premises, to sell counterfeit and pirated items