intellectual property rights an overview of laws, licenses and copyright protection a presentation...
TRANSCRIPT
Intellectual Property Intellectual Property RightsRights
An Overview of Laws, Licenses and Copyright An Overview of Laws, Licenses and Copyright ProtectionProtection
A Presentation by Team 9A Presentation by Team 9Perhaps the Greatest Team Ever to Exist…Perhaps the Greatest Team Ever to Exist…EVEREVER!!
Cole Hoosier, Alex Stampbach, Leanne Gray, Cole Hoosier, Alex Stampbach, Leanne Gray, Ryan Hannebaum, Matthew CookRyan Hannebaum, Matthew Cook
an umbrella term for various legal an umbrella term for various legal entitlements which attach to certain entitlements which attach to certain types of information, ideas, or other types of information, ideas, or other intangibles in their expressed formintangibles in their expressed form
Intellectual PropertyIntellectual Property
Software Copyright InfringementSoftware Copyright Infringement
Several different typesSeveral different types Creating a copy for resaleCreating a copy for resale ““Bulletin board” sharingBulletin board” sharing ““Softlifting”Softlifting”
Unauthorized copying as ethical choiceUnauthorized copying as ethical choice Existing and proposed lawsExisting and proposed laws
TRIPSTRIPS EULAEULA UCITAUCITA
The Scope of the ProblemThe Scope of the ProblemRanRan
kk ProductProduct ValueValue
11 MarijuanaMarijuana 141.80 Billion141.80 Billion
22Counterfeit Technology Counterfeit Technology ProductsProducts 100 Billion100 Billion
33 CocaineCocaine 70.45 Billion70.45 Billion
44 Opium/HeroinOpium/Heroin 64.82 Billion64.82 Billion
55 Pirated Web VideosPirated Web Videos 60 Billion60 Billion
66 Counterfeit Pharmaceutical DrugsCounterfeit Pharmaceutical Drugs 40 Billion40 Billion
77 Pirated SoftwarePirated Software 34 Billion34 Billion
88 Human TraffickingHuman Trafficking 32 Billion32 Billion
99 Amphetamines/MethAmphetamines/Meth 28.25 Billion28.25 Billion
1010 Animals and Wildlife SmugglingAnimals and Wildlife Smuggling 20 Billion20 Billion
http://www.havocscope.com/products.htm
Attempts to Stop the Problem Attempts to Stop the Problem
Genuine Microsoft Software ToolsGenuine Microsoft Software Tools((http://www.microsoft.com/resources/howtotell/ww/windows/default.mspxhttp://www.microsoft.com/resources/howtotell/ww/windows/default.mspx))
Genuine copies allow users to get updatesGenuine copies allow users to get updates ““Customers who purchase counterfeit Customers who purchase counterfeit
products could find they are missing key products could find they are missing key elements, such as user manuals, product elements, such as user manuals, product keys, certificates of authenticity and even keys, certificates of authenticity and even software code. They may also find that software code. They may also find that the counterfeit software contains viruses the counterfeit software contains viruses or does not work as well as the genuine or does not work as well as the genuine product does.” (Microsoft Product product does.” (Microsoft Product Activation FAQ)Activation FAQ)
FreewareFreeware
Software is free to useSoftware is free to use No limitations are placed on the No limitations are placed on the
programprogram Author may *ask* for donations, but Author may *ask* for donations, but
won’t demand themwon’t demand them Examples: Vim, several flash-type Examples: Vim, several flash-type
gamesgames
SharewareShareware
use is completely free use is completely free product is not fully functional unless product is not fully functional unless
"unlocked“"unlocked“ Unlocking usually is by entering a Unlocking usually is by entering a
key that is purchasedkey that is purchased Example: WinZipExample: WinZip
DemowareDemoware
Type of sharewareType of shareware Feature set of the software is limited Feature set of the software is limited
in some mannerin some manner Examples: Can’t save state or Examples: Can’t save state or
program halts after 15 minutesprogram halts after 15 minutes
GNU General Public LicenseGNU General Public License
Source is availableSource is available ““Copyleft”Copyleft”
Uses copyright laws to ensure that Uses copyright laws to ensure that modified versions retain the same modified versions retain the same freedomsfreedoms
Lesser (or Library) GPLLesser (or Library) GPL Can be linked into non-GPL programCan be linked into non-GPL program
Example: most software for LinuxExample: most software for Linux
BSD-style LicensesBSD-style Licenses
Closer to public domain than GPLCloser to public domain than GPL Has been called “copycenter”Has been called “copycenter” Allows proprietary commercial use, Allows proprietary commercial use,
and for the software released under and for the software released under the license to be incorporated into the license to be incorporated into proprietary commercial products proprietary commercial products
Example: NetBSDExample: NetBSD
MIT LicenseMIT License
Very (very) similar to the BSD-style Very (very) similar to the BSD-style licenseslicenses
Example: X11 for LinuxExample: X11 for Linux
Security – SoftwareSecurity – Software
ValidationValidation Key checksKey checks RegistrationRegistration
LimitationsLimitations
ValidationValidation
Making the software legalMaking the software legal Verifying the user has the proper Verifying the user has the proper
rights to use the softwarerights to use the software
Key checksKey checks
Software requires you to enter a Software requires you to enter a product keyproduct key
Software will not function without a Software will not function without a valid keyvalid key
Only given a valid key when you Only given a valid key when you purchase the softwarepurchase the software
Key checksKey checks
Bnetd projectBnetd project Free online communityFree online community Distributed open source codeDistributed open source code Bnetd allowed users to create chat rooms, Bnetd allowed users to create chat rooms,
connect to other users, and play gamesconnect to other users, and play games Blizzard uses battle.net but uses CD key Blizzard uses battle.net but uses CD key
checkschecks Blizzard sued them because they didn’t Blizzard sued them because they didn’t
check authenticity to the game check authenticity to the game
CD CracksCD Cracks
CD crack codes can get around key CD crack codes can get around key checkschecks
Eliminate the use of a CDEliminate the use of a CD
RegistrationRegistration
Some products require you to Some products require you to register the productregister the product
Registration can be used as a Registration can be used as a validation techniquevalidation technique
You have to have a registration to You have to have a registration to get updatesget updates
LimitationsLimitations
File SharingFile Sharing Peer to Peer (P2P)Peer to Peer (P2P)
Improve existing software Improve existing software
Protection Through DocumentsProtection Through Documents
PasswordsPasswords DialsDials ManualsManuals
““Bottom of Page 6”Bottom of Page 6” HiddenHidden
Vital InformationVital Information Manual contains data necessary to use Manual contains data necessary to use
softwaresoftware
Protection Through HardwareProtection Through Hardware
Dongles – 1980’sDongles – 1980’s USB keys, ParallelUSB keys, Parallel ImplementationsImplementations
Check for Dongle’s presenceCheck for Dongle’s presence Store key parts of Program on DongleStore key parts of Program on Dongle
CD CheckCD Check
LenslokLenslok Hold a Prism up to ScreenHold a Prism up to Screen
Protection Through PeopleProtection Through People
““Honor System”Honor System” Software reminds you that the free trial Software reminds you that the free trial
is overis over
PropagandaPropaganda Shorts before MoviesShorts before Movies PostersPosters Fake MP3 files in Sharing NetworksFake MP3 files in Sharing Networks