intellectual property rights an overview of laws, licenses and copyright protection a presentation...

27
Intellectual Intellectual Property Rights Property Rights An Overview of Laws, Licenses and An Overview of Laws, Licenses and Copyright Protection Copyright Protection A Presentation by Team 9 A Presentation by Team 9 Perhaps the Greatest Team Ever to Exist… Perhaps the Greatest Team Ever to Exist… EVER EVER ! ! Cole Hoosier, Alex Stampbach, Leanne Cole Hoosier, Alex Stampbach, Leanne Gray, Gray, Ryan Hannebaum, Matthew Cook Ryan Hannebaum, Matthew Cook

Upload: victoria-blair

Post on 26-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

Intellectual Property Intellectual Property RightsRights

An Overview of Laws, Licenses and Copyright An Overview of Laws, Licenses and Copyright ProtectionProtection

A Presentation by Team 9A Presentation by Team 9Perhaps the Greatest Team Ever to Exist…Perhaps the Greatest Team Ever to Exist…EVEREVER!!

Cole Hoosier, Alex Stampbach, Leanne Gray, Cole Hoosier, Alex Stampbach, Leanne Gray, Ryan Hannebaum, Matthew CookRyan Hannebaum, Matthew Cook

Intellectual Property Intellectual Property LawsLaws

an umbrella term for various legal an umbrella term for various legal entitlements which attach to certain entitlements which attach to certain types of information, ideas, or other types of information, ideas, or other intangibles in their expressed formintangibles in their expressed form

Intellectual PropertyIntellectual Property

Software Copyright InfringementSoftware Copyright Infringement

Several different typesSeveral different types Creating a copy for resaleCreating a copy for resale ““Bulletin board” sharingBulletin board” sharing ““Softlifting”Softlifting”

Unauthorized copying as ethical choiceUnauthorized copying as ethical choice Existing and proposed lawsExisting and proposed laws

TRIPSTRIPS EULAEULA UCITAUCITA

The Scope of the ProblemThe Scope of the ProblemRanRan

kk ProductProduct ValueValue

11 MarijuanaMarijuana 141.80 Billion141.80 Billion

22Counterfeit Technology Counterfeit Technology ProductsProducts 100 Billion100 Billion

33 CocaineCocaine 70.45 Billion70.45 Billion

44 Opium/HeroinOpium/Heroin 64.82 Billion64.82 Billion

55 Pirated Web VideosPirated Web Videos 60 Billion60 Billion

66 Counterfeit Pharmaceutical DrugsCounterfeit Pharmaceutical Drugs 40 Billion40 Billion

77 Pirated SoftwarePirated Software 34 Billion34 Billion

88 Human TraffickingHuman Trafficking 32 Billion32 Billion

99 Amphetamines/MethAmphetamines/Meth 28.25 Billion28.25 Billion

1010 Animals and Wildlife SmugglingAnimals and Wildlife Smuggling 20 Billion20 Billion

http://www.havocscope.com/products.htm

Attempts to Stop the Problem Attempts to Stop the Problem

Genuine Microsoft Software ToolsGenuine Microsoft Software Tools((http://www.microsoft.com/resources/howtotell/ww/windows/default.mspxhttp://www.microsoft.com/resources/howtotell/ww/windows/default.mspx))

Genuine copies allow users to get updatesGenuine copies allow users to get updates ““Customers who purchase counterfeit Customers who purchase counterfeit

products could find they are missing key products could find they are missing key elements, such as user manuals, product elements, such as user manuals, product keys, certificates of authenticity and even keys, certificates of authenticity and even software code. They may also find that software code. They may also find that the counterfeit software contains viruses the counterfeit software contains viruses or does not work as well as the genuine or does not work as well as the genuine product does.” (Microsoft Product product does.” (Microsoft Product Activation FAQ)Activation FAQ)

Software DistributionSoftware Distribution

FreewareFreeware

Software is free to useSoftware is free to use No limitations are placed on the No limitations are placed on the

programprogram Author may *ask* for donations, but Author may *ask* for donations, but

won’t demand themwon’t demand them Examples: Vim, several flash-type Examples: Vim, several flash-type

gamesgames

SharewareShareware

use is completely free use is completely free product is not fully functional unless product is not fully functional unless

"unlocked“"unlocked“ Unlocking usually is by entering a Unlocking usually is by entering a

key that is purchasedkey that is purchased Example: WinZipExample: WinZip

DemowareDemoware

Type of sharewareType of shareware Feature set of the software is limited Feature set of the software is limited

in some mannerin some manner Examples: Can’t save state or Examples: Can’t save state or

program halts after 15 minutesprogram halts after 15 minutes

LicensingLicensing

Mi casa es su casa?Mi casa es su casa?

GNU General Public LicenseGNU General Public License

Source is availableSource is available ““Copyleft”Copyleft”

Uses copyright laws to ensure that Uses copyright laws to ensure that modified versions retain the same modified versions retain the same freedomsfreedoms

Lesser (or Library) GPLLesser (or Library) GPL Can be linked into non-GPL programCan be linked into non-GPL program

Example: most software for LinuxExample: most software for Linux

BSD-style LicensesBSD-style Licenses

Closer to public domain than GPLCloser to public domain than GPL Has been called “copycenter”Has been called “copycenter” Allows proprietary commercial use, Allows proprietary commercial use,

and for the software released under and for the software released under the license to be incorporated into the license to be incorporated into proprietary commercial products proprietary commercial products

Example: NetBSDExample: NetBSD

MIT LicenseMIT License

Very (very) similar to the BSD-style Very (very) similar to the BSD-style licenseslicenses

Example: X11 for LinuxExample: X11 for Linux

Copyright ProtectionCopyright Protection

Security – SoftwareSecurity – Software

ValidationValidation Key checksKey checks RegistrationRegistration

LimitationsLimitations

ValidationValidation

Making the software legalMaking the software legal Verifying the user has the proper Verifying the user has the proper

rights to use the softwarerights to use the software

Key checksKey checks

Software requires you to enter a Software requires you to enter a product keyproduct key

Software will not function without a Software will not function without a valid keyvalid key

Only given a valid key when you Only given a valid key when you purchase the softwarepurchase the software

Key checksKey checks

Bnetd projectBnetd project Free online communityFree online community Distributed open source codeDistributed open source code Bnetd allowed users to create chat rooms, Bnetd allowed users to create chat rooms,

connect to other users, and play gamesconnect to other users, and play games Blizzard uses battle.net but uses CD key Blizzard uses battle.net but uses CD key

checkschecks Blizzard sued them because they didn’t Blizzard sued them because they didn’t

check authenticity to the game check authenticity to the game

CD CracksCD Cracks

CD crack codes can get around key CD crack codes can get around key checkschecks

Eliminate the use of a CDEliminate the use of a CD

RegistrationRegistration

Some products require you to Some products require you to register the productregister the product

Registration can be used as a Registration can be used as a validation techniquevalidation technique

You have to have a registration to You have to have a registration to get updatesget updates

LimitationsLimitations

File SharingFile Sharing Peer to Peer (P2P)Peer to Peer (P2P)

Improve existing software Improve existing software

Protection Through DocumentsProtection Through Documents

PasswordsPasswords DialsDials ManualsManuals

““Bottom of Page 6”Bottom of Page 6” HiddenHidden

Vital InformationVital Information Manual contains data necessary to use Manual contains data necessary to use

softwaresoftware

Protection Through HardwareProtection Through Hardware

Dongles – 1980’sDongles – 1980’s USB keys, ParallelUSB keys, Parallel ImplementationsImplementations

Check for Dongle’s presenceCheck for Dongle’s presence Store key parts of Program on DongleStore key parts of Program on Dongle

CD CheckCD Check

LenslokLenslok Hold a Prism up to ScreenHold a Prism up to Screen

www.zock.com

Protection Through PeopleProtection Through People

““Honor System”Honor System” Software reminds you that the free trial Software reminds you that the free trial

is overis over

PropagandaPropaganda Shorts before MoviesShorts before Movies PostersPosters Fake MP3 files in Sharing NetworksFake MP3 files in Sharing Networks

Questions?Questions?