Sub: IPR and Cyber Laws Solution 1. Attempt any two of the following: a. What is the objective behind Patent Law? Ans: Definition of Patent: (2 marks) Patent means a grant of some privilege, property or authority made by the Government or the Sovereign of the country to one or more individuals. The instrument by which such grant is made is known as “patent”. Objectives of the Indian Patent Act 1970: (all 5 points)(3 marks) In order for the Indian Patent Act to be successful following are the objectives: 1. Import of various product should be excluded from the definition of invention. 2. The Government of India (GOI) should give certain privileges and incentives to encourage inventors to invent new products. 3. All inventors should not disclose trade secrets about their inventions. 4. The inventors are encouraged to invent new and useful in case of manufacturing products. 5. The main purpose of an invention is not only to protect its owners but also to encourage true and fair competition in the field of technology. b. Explain method of drafting patent specification. Ans: The specification, which is also called the disclosure, is a written description of an invention. The patent specification is drafted both to satisfy the written requirements for patentability, as well as to define the scope of the claims. The layout of a specification varies from place to place. Drafting method through a layout and it contains the following elements: 1. Title(1 mark) The title describes the essence of the invention in a few words. The title: must relate to and broadly describe the invention (e.g. “A waterproof zip-fastener") should not include acronyms, statements of quality, trade marks, fancy names, the word “patent” or personal names. 2. Description(4 components---2 mark) The description makes up the majority of the specification. It explains the invention and how to put it into practice. The description may include the following headings: Technical field: The description usually begins with a brief statement identifying the technical field of the invention. For example, “The invention relates to … and is suitable for [activity or purpose]." 10 Background of the invention (optional): You can include some background information describing what is known (i.e. the most pertinent prior art), mention if your invention attempts to solve any particular problems and include objectives for the invention. Please note that the invention as described or claimed should meet any of these objectives. Statement of invention: This section summarises the essential and preferred features of the invention. It sets out the scope of the invention and should be equivalent to the main claims of your specification or, in the case of a provisional specification, claims you intend using for any subsequent complete specification. Detailed description of the invention: The final part of the description describes the technical aspects of the invention in detail, explaining how to construct and use examples of the invention or how the inventive process can be carried out. Graphs, flowcharts, tables, experimental data and drawings can be included. 3. Claims (description and its explanation----2 marks) Patent claims define the protective boundaries of the invention (the “scope of monopoly”). Claims must be clear, supported by the description, and list all of the essential features of the invention. Note: Complete specifications must end with at least one claim. Each claim should be written as one sentence. A claim can be independent or dependent on an earlier claim(s). Generally, claims begin with the broadest claim and progress to narrower claims. Claims should not contain laudatory statements like “it is cheaper" or “it is the best way of doing it that I have seen". The claims are usually presented on a separate page or pages, under the heading “What I/We Claim Is:". The page numbering follows on from the description. c. What is a trademark? What are its functions? Ans: MEANING OF ‘TRADE MARK’ (1 mark) A consumer is duped if he buys a commodity presuming it to have originated from a certain identified source when actually it is not, and later he finds the commodity substandard. In the process, the reputation of trader suffers. The interests of both the consumer and the trader can be saved if some definite symbol which marks out the origin of goods from a definite trade source is attached with the goods emanating from such source. Such a symbol is called a trade mark. THE FUNCTIONS OF A TRADE MARK (Four functions----4 marks) A trade mark serves the purpose of identifying the source of origin of goods. Trade mark performs the following four functions:-1. It identifies the product and its origin. For example, the trade mark ‘Brooke Bond’ identifies tea originating from the Company manufacturing tea and marketing it under that mark. 2. It guarantees its quality. The quality of tea sold in the packs marked Brooke Bond Tea would be similar but different from tea labeled with mark Taj Mahal. 3. It advertises the product. The trade mark represents the product. The trade mark ‘Sony’ is associated with electronic items. The trade mark SONY rings bell of particular quality of particular class of goods. It thus advertise the product while distinguishing it from products of Sony’s competitors. 4. It creates an image of the product in the minds of the public, particularly comes or the prospective consumers of such goods. The mark ‘M’ which stands for the food items originating from the American fast food chain McDonalds creates an image and reputation for food items offered by it for sale in the market. d. What is a copyright? What are its characteristics? Ans: Definition of Copyright: (1 mark) Copyright is a unique kind of intellectual property. The right which a person acquires in a work, which is the result of his intellectual labour, is called his copyright. The primary function of a copyright law is to protect the fruits of a man’s work, labour, skill or test from being taken away by other people. CHARACTERISTICS OF COPYRIGHT (all 7 characteristics----4 marks) 1. Creation of a statute Copyright is creation of a specific statute under the present law. There is no such things as common law copyright. No copyright can exist in any work except as provided in the section 16 of the Act. 2. Some Form of intellectual property A copyright is a form of intellectual property since the product over which the right is granted, e.g., a literary work, is the result of utilization and investment of intellect. 3. Monopoly right Copyright is a monopoly right restraining the others from exercising that right which has been conferred on the owner of copyright under the provisions of the Act. 4. Negative right Copyright is a negative right meaning thereby that it is prohibitory in nature. It is a right to prevent others from copying or reproducing the work. 5. Object of copyright The object of copyright law is to encourage authors, composers and artists to create original works by rewarding them with the exclusive right for a specified period to reproduce the works for publishing and selling them to public. The foundation of Indian Copyright Law, which is of English origin and provenance has a moral basis, and is based on the Eighth Commandment, “Thou Shalt not Steal” (as held by the Supreme Court in R.G. Anand Case 1978). The fundamental objective of Indian and English Copyright Law has always been the protection of the fruits of a man’s skill, labour and effort from appropriation by others. Thus protecting, recognizing and encouraging the labour, skill and capital of another is the object of a copyright. 6. Multiple rights Copyright is not a single right. It consists of a bundle of different rights in the same work. For instance, in case of a literary work copyright comprises the right of reproduction in hard back and paperback editions, the right of serial publication in newspapers and magazines, the right of dramatic and cinematographic versions, the right of translation, adaptation, abridgement and the right of public performance. 7. Neighboring rights Copyright consists not merely of the right to reproduction. It also consists of the right to works derived from the original works; rights like the right of public performance, the recording right and the broadcasting right which are as important or even more than the right of reproduction. Such related rights are termed “neighboring rights”. 2. Attempt any two of the following: a. Explain computer software as Intellectual Property and its protection. Copy right law and computer software: (2 points---2 marks) a) In India, the Intellectual Property Rights (IPR) of computer software is covered under the Copyright Law. Accordingly, the copyright of computer software is protect b) ed under the provisions of Indian Copyright Act 1957. c) Major changes to Indian Copyright Law were introduced in 1994 and came into effect from 10 May 1995. These changes or amendments made the Indian Copyright law one of the toughest in the world. Its Protection: (6 points----3 marks) Since most software is easy to duplicate, and the copy is usually as good as original, the Copyright Act was needed. Some of the key aspects of the law are: According to section 14 of this Act, it is illegal to make or distribute copies of copyrighted software without proper or specific authorization. The violator can be tried under both civil and criminal law. A civil and criminal action may be instituted for injunction, actual damages (including violator's profits) or statutory damages per infringement etc. Heavy punishment and fines for infringement of software copyright. Section 63 B stipulates a minimum jail term of 7 days, which can be extended up to 3 years. b. Explain SCPA Semiconductor Chip Protection Act, in detail. What is SCPA? (1 mark) 10 The Semiconductor Chip Protection Act of 1984 was an innovative solution to this new problem of technology-based industry. While some copyright principles underlie the law, as do some attributes of patent law, the Act was uniquely adapted to semiconductor mask works, in order to achieve appropriate protection for original designs while meeting the competitive needs of the industry and serving the public interest. How SCPA Operates? (Any 4 features with brief explanation---4 marks) Although the U.S. SCPA is codified in title 17 (copyrights), the SCPA is not a copyright or patent law. Rather, it is a law resembling a utility model law. It has some aspects of copyright law, some aspects of patent law, and in some ways it is completely different from either. In general, the chip topography laws of other nations are also utility model laws. Nevertheless, copyright and patent case law illuminate many aspects of the SCPA and its interpretation. 1. Acquisition of protection by registration Chip protection is acquired under the SCPA by filing with the U.S. Copyright Office an application for "mask work" registration under the SCPA, together with a filing fee. The application must be accompanied by identifying material, such as pictorial representations of the IC layers—so that, in the event of infringement litigation, it can be determined what the registration covers. Protection continues for ten years from the date of registration. 2. Mask works The SCPA repeatedly refers to "mask works." This term is a remains of the original form of the bill that became the SCPA and was passed in the Senate as an amendment to the Copyright Act. The term mask work is parallel to and consistent with the terminology of the 1976 Copyright Act, which introduced the concept of "literary works," "pictorial works," "audiovisual works," and the like—and which protected physical embodiments of such works, such as books, paintings, video game cassettes, and the like against unauthorized copying and distribution. The term "mask work" is not limited to actual masks used in chip manufacture, but is defined broadly in the SCPA to include the topographic creation embodied in the masks and chips. Moreover, the SCPA protects any physical embodiment of a mask work. 3. Enforcement The owner of mask work rights may pursue an alleged infringer ("chip pirate") by bringing an action for mask work infringement in federal district court. The remedies available correspond generally to those of copyright law and patent law. 4. Functionality unprotected The SCPA does not protect functional aspects of chip designs. That is reserved to patent law. Although EPROM and other memory chips topographies are protectable under the SCPA, such protection does not extend to the information stored in chips, such as computer programs. Such information is protected, if at all, only by copyright law. 5. Reverse engineering not prohibited The SCPA permits competitive emulation of a chip by means of reverse engineering. The ordinary test for illegal copying (mask work infringement) is the "substantial similarity" test of copyright law, but when the defence of reverse engineering is involved and supported by probative evidence, then, the accused chip topography must be substantially identical rather than just substantially similar, for the defendant to be liable for infringement. Most world chip topography protection laws provide for a reverse engineering privilege. c. Explain the procedure for registration of domain names. Definition: (1 mark) A domain name is an identification string that defines a sphere of administrative autonomy, authority, or control on the Internet. Domain names are formed by the rules and procedures of the Domain Name System(DNS). Domain names are used in various networking contexts and applicationspecific naming and addressing purposes. In general, a domain name represents an Internet Protocol(IP) resource, such as a personal computer used to access the Internet, a server computer hosting web site or the web site itself or any other service communicated via the Internet. If desired, you can register more than one domain name at the same time. Steps of Registration: (9 steps in flow 3 marks) Registering is done one step at a time as outlined below. 1. Use the Search function to verify that the domain name(s) you'd like is/are available 2. Select the domain name(s) you want to register 3. Setup your account control panel by entering a UserName and Password 4. Select the number of years you want to register 5. Enter information to register your ownership of the domain name(s) ;Click on "Continue" 6. Review your contact information. If the same information is to be used for the Technical, Administrative and Billing contacts, nothing further needs to be done. However, if there is different person to be listed as the Technical, Administrative and/or Billing contacts, click on that title to enter their information. If these are not changed, the registrant (owner) will be listed as all contacts. Click on "Continue". 7. Enter the DNS - Domain Name Services - data for your website host. 8. Add Web E-mail or E-mail Forwarding (if desired) and confirm that all the registration information is correct. 9. Review and confirm that item(s) being ordered is/are correct ;Make payment by credit card - shopping cart is That SSL secured ; Use your browser's Print button to print a receipt Conclusion: (1 mark) your domain name(s) will be registered in real-time. Within 72 hours the domain name will become accessible on the internet which is the normal internet propagation time -the time for new DNS information to spread to the thousands of name servers all over the internet. It is impossible for someone else to register your domain name after you registered it because our domain name will be verified for availability through shared registration systems. Basically, these is a universal database of unavailable domain names. These systems prevent a domain name that has been successfully registered from being registered by others. d. What are digital Copyright issues? About digital Copyright: (1 mark) The decentralized nature of Internet makes it possible for any user to disseminate a work endlessly in the cyberspace through an end number of outlets, thereby giving rise to global piracy. Estimates of global losses from pirated books, music and entertainment software range into billions of dollars. The Internet in a way presents a troublesome situation for copyright holders as the users become mass disseminators of others copyright material and creates disequilibrium between the authors and users. The advent of digital technology, therefore presents legislators with a choice: either expand or modify existing 'old media notions' or redefine the catalogue of restricted acts. Taking into account the peculiarities of the new environment , multiple aspects of issues are discussed as given below. (Any 4 issues with brief explanation---4 marks) The Right of Reproduction : (Web casting) The reproduction right has been at the heart of copyright law for more than three hundred years. Though recognized as a determining right, the reproduction right per se has not been unambiguously delimited by the international instruments for copyright protection . Due to the lack of agreement on the right's scope and content, it did not include any provision that expressly protected the reproduction right The advent of the Internet makes the delimitation of the reproduction right more problematic in the digital age. Given that any transmission of protected works over the Internet involves the reproductions transitorily stored in the connected computers' RAM, the question of whether right owners should be granted with the control over all temporary reproductions looms large amid the dematerialized and decentralized nature of the Internet. The Right of Communication to the Public :(Database protection) Digital technology blurs the line between different categories of copyrightable works and the means of communication to the public as well. On the other hand, in the midst of fast development in digital technology, the computer networks, in particular the Internet, brings forth a point-to-point way of transmitting works on an on-demand and interactive basis. The interactivity and individuality afforded by this new method of exploiting works, makes it possible for any member of the public to have the full discretion in determining the place and the time one is intended to access and use works in digital form. Legal Protection of Technological Measures:(Source of protection) In response to the increasing ease of reproduction and disseminating works over the internet, copyright owners and their technology have designed entirely novel and more effective technological measures, to constrain physical access to and use of their copyrighted works. The North America Free Trade Agreement, 1992 provides for criminal and civil remedies against decoding the encrypted program carrying satellite signals and related acts. Legal Protection of Rights Management Information : (ISP liabilities) It is important that whenever a work or an object of related rights is requested and transmitted over the network, the fact of the use is registered together with all the information necessary to ensure that the agreed payment can be transferred to the appropriate right owner(s). Various technologies in this respect are available or being developed which will enable the necessary feedback to the right owners. It is crucial, however, that such information is not removed or distorted, because the remuneration of the right owners would in that case not be paid at all, or it would be diverted. Limitations and Exceptions:(Rights of performance) From earliest times in the history of copyright, it has been recognized that in certain cases limitations or exceptions should be placed on the exercise or scope of established rights and may be termed as “internal restrictions”, i.e. they are actual or potential restrictions resulting from the provisions of the instrument itself . The reasons given for imposing such restrictions may be based on considerations of public interest, prevention of monopoly control, etc. The limitations on copyright are necessary to keep the balance between two conflicting public interests: the public interest in rewarding creators and the public interest in the widest dissemination of their works, which is also the interest of the users of such works . Copyright Enforcement in Digital Environment: (Linking) Global computer-based communications cut across territorial borders, creating a new empire of human activity and undermining the feasibility and legitimacy of laws based on geographical boundaries. Digital technology has made copyright enforcement difficult to achieve. In the online environment, works such as videos, recordings of musical performances, and texts can be posted anywhere in the world, retrieved from databases in foreign countries, or made available by online service providers to subscribers located throughout the globe. Our system of international copyright protection, however, historically has been based on the application of national copyright laws with strict territorial effects and on the application of choice-of-law rules to determine which country's copyright laws would apply. 3. Attempt any two of the following: 10 a. Discuss transfer of patent rights in the form of assignment. What is assignment: (1 mark) Assignment, as defined in Black’s Law Dictionary, means the transfer by a party of all of its rights or interest in the property. In case of intangible property like a patent, the transfer is made through an agreement to this effect. The difference between assignment and licence (2 points---2 marks) 1. A licence merely confers a personal privilege to do some particular act(s) which the licensee can perform. There is no transfer of interest in license. 2. On the contrary, assignment means the transfer of interest in the patent: whole or in part of the patent rights, e.g., for the whole of India or a part thereof. Assignee (3 points---2 marks) 1. The person in whose favor a right has been assigned is the assignee and the person who assigns the right (patentee himself or his agent) is the assignor. 2. In case an assignment has been made in favor of a person who has since died, the term assignee would denote the legal representative, that is the person who in law represents the estate of the deceased person. 3. Where assignment is made in favor of two or more persons, they become owners of such interest in the patent. b. What are different kinds of assignments? There can be 3 kinds of assignments : Enlist the three types of assignment:(1 mark) 1. Legal 2. Equitable 3. Mortgage Explanation: 1. Legal assignment (1 mark) – An assignment of an existing patent through an agreement which has been duly registered is a legal assignment. A legal assignee has the right to have his name entered in the Register of patents maintained in the Controller’s Office as proprietor of the patent and can thereafter exercise all the rights conferred on him by the proprietor of patent. 2. Equitable assignment (2 marks) – Any document such as letter not being an agreement, which is duly registered with Controller in which patentee agrees to give another person certain defined right in the patent with immediate effect, is an equitable assignment. An assignee in such a case cannot have his name entered in the Register as the proprietor of patent. He can only have a notice of his interest entered in the register. He can convert the equitable assignment to legal assignment by getting a written agreement to this effect and having it duly registered. 3. Mortgage (1 mark) – A mortgage is also a form of assignment. A mortgage is a document transferring the patent rights either wholly or partly to the mortgagee with a view to secure the payment of a specified sum of money. The mortgagor (patentee) is entitled to have the patent re-transferred to him on refund of the money to the mortgagee. The mortgagee (a person in whose favour a mortgage is made) is not entitled to have his name entered in the Register as the proprietor, but he can get his name entered in the Register as a mortgagee. c. Explain “Protecting good will through copy rights”. Ans: Introduction of Protection of Goodwill (2 points---2 marks) 1. Many country protect unregistered well known marks in accordance to international obligations. 2. Not only big company but also small scale enterprises have a good chance of establishing goodwill with customers so that their trademarks are well recognized and well known that acquires protection without registration, however it is important to register your trademark, if not the reputation of trademark can be weekend by unauthorized use of that mark by others. Every trademark user should be aware of the facts that are related to a number of trademarks. (3 points---3 marks) Trademark are registered and protected user the following conditionsi. The goods and services for which the marks is used and is not identified or similar to the goods for which the well known mark is being used. ii. The use of another mark indicates a connection between these goods and the owner of well known Trademark. iii. The user of the owner of the Trademark where his interest are likely to be damaged by such use. d. What are essential factors for infringement of Trademark? Ans: About infringement: ( 1 mark) Infringement of a trade mark occurs if a person other than the registered proprietor in the course of trade, in relation to the same goods or services for which the mark is registered, uses the same mark or a deceptively similar mark. ESSENTIALS OF INFRINGEMENT (4 points---4marks) 1. The taking of any essential feature of the mark or taking the whole of the mark and then making a few additions and alterations would constitute infringement. 2. The infringing mark must be used in the course of trade, i.e., in a regular trade wherein the proprietor of the mark is engaged. 3. The use of the infringing mark must be printed or usual representation of the mark in advertisements, invoices or bills. Any oral use of the trade mark is not infringement. 4. Any or all of the above acts would constitute infringement if the same is done in such manner as to sender the use of the mark likely to be taken as being used as a trade mark. 4. Attempt any two of the following: 10 a. What are disadvantages of IP licensing? What is IP Licensing (1 mark) Disadvantages: (4 points----4 marks) 1. Though IP licensing is beneficial to both licensor & licensee, sometimes through licensing, the owner may lose his control on the technology & there may be great risk of piracy & exploitation by unauthorized parties. 2. It may so happen that the licensee develops technology around the product, he has the license for & make the original licensor to lose his superiority. 3. The revenue from the licensee depends on his performance. Hence the licensor loses the revenue to that extent. For the licensee, the technology may become redundant in short span of time & he may have to go in for a new one at a higher price. 4. In case the technology is not tested, the licensee will be at great risk of losing the money if relevant risk aversion clauses are not stipulated in the agreement. Hence, in IPR licenses agreement, the terms & conditions need careful drafting. b. Explain in brief the civil remedies in enforcing intellectual property rights. About Enforcing IPR: (1 marks) 1. Every right holder under the IPR is subject to the right to seek review by a judicial authority. These rights of the defendant should be an action without prejudice. 2. In case of infringing cases the authority can dispose these infringing goods as per their rights. Hence only in exceptional circumstances related to infringing goods these need not be disposed. Civil remedies:- (All 6 points---4 marks) 1. The right holders concerning to the enforcement of IPR has to provide a written notice within a stipulated timeframe to the defending party. 2. Parties shall be allowed to have representatives to fight their cases individually. 3. All parties during proceedings are entitled to their claims and need to present relevant evidence. 4. These procedures provide identification and protection of confidential information. 5. The opposing party in appropriate cases needs to produce evidence which specifies the situation related to the case. 6. In cases where the parties are not allowed to access their goods in such cases the judicial authorities make the final decisions based on the evidences presented by the parties who are adversely affected by the denial of access to information. c. Explain practical aspects of licensing. About Practical aspects of Licensing (2 marks) Practical aspects of Licensing permission from one person to another to undertake some activity a license agreement is formal and is in a written format which legally abides all the rules and regulations of the national law in this country . A license agreement includes two parties the licensor and the licensee. The licensor is the one who owns the intellectual property and agrees this property and agrees this property to be use by another person. The licensee is the one who receives the right to use the intellectual property for exchange of payment .Hence , a license in as an agreement which is in partnership between IP owner ( licensor ) and the authorized user ( licensee ) under certain conditions for which monetary compensations paid .Thus, a license grants the licensee the rights to use property but without transferring the ownership of the property. The Intellectual property effective conditions [Determination Factor] (3 factors---3 marks) Intellectual property License can be effective if 3 conditions are met. 1) The licenser or must be the owner of the property. 2) The IP must be protected by the law or at least by eligible protection. 3) The license must specify the rights of the licensee and the payment required that need to be paid for the IP assets which are given in exchange as per the license agreement which is clearly stated. d. Classify and explain the licensing agreement. Five types with brief explanation---5 marks A licensing agreement is a partnership between an IP owner(licensor) & someone who is authorized to use such rights (licensee), in exchange for an agreed payment( fee or royalty). A variety of such licensing agreements are available, which may be broadly categorized as follows: Technology license Joint venture license Franchising or trade-mark license Copyright license In practice, sometimes all IP rights form the part of one agreement. These types of agreements are often observed in mergers & acquisitions, Joint ventures or take overs. In the international context, a formal licensing agreement is possible only if the IPR licensor, who wishes to license, is also protected in the other country or countries of interest. If IP is not protected in other country or countries then licensing in that country is not possible as licensor would have no legal right to put any restrictions on its use by any other party. 5. Attempt any two of the following: a. Explain the scope of cyber laws. Ans : About cyber laws: (1 mark) Scope explanation---8 valid points with brief explanation---4 marks b. What is UDRP (Uniform Domain-Name Dispute Resolution Policy)? Explain. About domain name dispute: (1 mark) A domain name dispute is a conflict that arises when more than one individual or group believes it has the right to register a specific domain name. Most commonly a domain name dispute would occur when a domain name similar to a registered trademark is registered by an individual or organization who is not the trademark owner. What is UDRP? (1 mark) The Uniform Domain-Name Dispute-Resolution Policy (UDRP) is a process established by the Internet Corporation for Assigned Names and Numbers (ICANN) for the resolution of disputes regarding the registration of internet domain names. All domain name registrars must follow the ICANN's Uniform Domain-Name Dispute-Resolution Policy (UDRP). The UDRP currently applies to all generic top level domains. About UDRP and ICANN: (6 valid points---3 marks) c. Explain briefly the issues of Enforcement of rights relevant to patent protection in digital media. Enforcement of Patent Rights: (Valid 10 points---5 marks) In most systems, a patent is the right enforceable in a court, usually to prevent the manufacture, sale and use of a patented invention. It is not, as many people think, permission to practice the patented invention, which may be subject to restrictions for other reasons such as security or public health. Application is made to the court to stop the unauthorized manufacture, sale or use of the invention, so that the court may grant the appropriate order and stop the infringement. In practice, however, the process is less straightforward than it sounds. Assessing the Scope of Patent Rights When thinking about patent enforcement, a patentee must first assess what he has patented. It is now a feature of just about all patent systems that a patent must include either a specification containing claims or a description, claims or any required drawings (depending on the terminology of the particular law). In most systems, the claims are decisive, as they define the scope of protection sought and eventually granted through the patent. The specification or the description and drawings may be used to interpret the claims, which must be fully supported by them. Most inventors use the services of a patent attorney to write the specification for them. An inventor may not fully understand the specification, and particularly may have difficulties in understanding the claims. Even where the patentee has some idea of the exclusive right granted to him in his own country, it is very rare for him to know with any precision what rights he may have in corresponding patents in other jurisdictions. The patentee’s first real understanding of the extent of his patent rights often only comes to him when he is considering enforcement. 10 Thus the basis for enforcement of patent rights is established at the start of the patenting process when the patent specification is written by the inventor or the inventor’s patent attorney. The examination process in the Patent Office can modify the original wording. The inventor will normally try to avoid any modification which will result in a limitation of the scope of protection, for any reduction in the scope of protection makes it easier for a competitor to avoid infringement. If a competitor can easily supply the market with something that is equivalent to the invention, but does not infringe the patent, then the patent may be of limited commercial value. Patent Office examiners should try to remember this when an applicant for a patent steadfastly resists amending his claims in order to overcome an objection, but instead tries to deal with the objection by argument. While acceding to an amendment might lead to the early grant of a patent on the application, it may also lead to a patent right of doubtful commercial utility. Evaluating Validity and Infringement of a Patent Having assessed the scope of the patent right, the next task is for the patentee to decide if there is infringement. Before committing himself to the financial risk of a patent case — which can be among the most time-consuming and expensive of all forms of litigation — a patentee, unless he is very wealthy and relaxed about money, must make some attempt to forecast whether he can be successful. The issue of infringement is very rarely considered on its own. Patents, like other forms of intellectual property, do not only affect the parties to a dispute; they have an effect on the public at large. This being the case, it is normally considered that a patent which can be shown to be invalid cannot be enforceable. In spite of the examination of patent applications during prosecution, no patent system guarantees the validity of a granted patent. In a patent enforcement action, therefore, a defendant will usually add to any defense of non-infringement a further defense, often in the form of a counterclaim, that the patent is invalid and hence not enforceable even if infringed. In some jurisdictions, the issues of infringement and validity are heard together. In others, the question of validity is heard separately by a different court or it may be referred to the Patent Office. Because of the principle that no invalid patent should be enforceable, the defendant in a patent action is usually allowed to bring in evidence of invalidity at any stage of the proceedings, and in some jurisdictions even during the trial itself. As a result, the position of the patentee during patent enforcement proceedings tends to deteriorate as a defendant makes searches and often finds evidence which is relevant to validity. d. What are the different roles of Certifying Authorities? Explain. Certifying Authority (any 3 roles---3 marks) (1) Any person may make an application to the Certifying Authority for the issue of a Digital Signature Certificate in such form as may be prescribed by the Central Government. (2) Every such application shall be accompanied by such fee not exceeding twenty-five thousand rupees as may be prescribed by the Central Government, to be paid to the Certifying Authority Provided that while prescribing fees under sub-section (2) different fees may be prescribed for Different classes of applications. (3) Every such application shall be accompanied by a certification practice statement or where there is no such statement, a statement containing such particulars, as may be specified by regulations. (4) On receipt of an application under sub-section (1), the Certifying Authority may, after consideration of the Certification practice statement or the other statement under subsection (3) and after making such enquiries as it may deem fit, grant the Digital Signature Certificate or for reasons to be recorded in writing, reject the application : Provided that no Digital Certificate shall be granted unless the Certifying Authority is satisfied that(a) the application holds the private key corresponding to the public key to be listed in The Digital Signature Certificate (b) the applicant holds a private key, which is capable of creating a digital signature; (c) the public key to be listed in the certificate can be used to verify a digital signature affixed by the private key held by the applicant : Provided further that no application shall be rejected unless the applicant has been given a reasonable opportunity of showing cause against the proposed rejection. What does CA should certify: (4 points---2 marks) A Certifying Authority while issuing a Digital Signature Certificate shall certify that- ( (a) it has complied with the provisions of this Act and the rules and regulations made there under; (b) it has published the Digital Signature Certificate or otherwise made it available to such person relying on it and the subscriber has accepted it; (c) the subscriber holds the private key corresponding to the public key, listed in the Digital Signature Certificate; (d) the subscriber's public key and private key constitute a functioning key pair; (e) the information contained in the Digital Signature Certificate is accurate; and (f) it has no knowledge of any material fact, which if it had been included in the Digital Signature Certificate would adversely affect the reliability of the representations made in clauses (a) to (d). 6. Attempt any two of the following: a. When was IT Act, 2000 amended? Enlist the major changes incorporated in the amendments. Ans: Introduction--about the need of IT Act and its amendments: (1 mark) An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as “electronic commerce”, which involve the use of alternatives to paperbased methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies. It is considered necessary to give effect to the said resolution and to promote efficient delivery of Government services by means of reliable electronic records. BE it enacted by Parliament in the Fifty-first Year of the Republic of India. Two major changes---Sec 1 and Section 2(2 marks each---4 marks) Sec 1. Short Title, Extent, Commencement and Application (any 4 points---2 marks) 10 (1) This Act may be called the Information Technology Act,2000. [As Amended by Information Technology (Amendment) Act 2008] (2) It shall extend to the whole of India and, save as otherwise provided in this Act, it applies also to any offence or contravention hereunder committed outside India by any person. (3) It shall come into force on such date as the Central Government may, by notification, appoint and different dates may be appointed for different provisions of this Act shall be constructed as a reference to the commencement of that provision. (4) Nothing in this Act shall apply to documents or transactions specified in the First Schedule by way of addition or deletion of entries thereto. (5) Every notification issued under sub-section (4) shall be laid before each House of Parliament. Sec 2. Definitions (any 4 terms---2 marks) (1) In this Act, unless the context otherwise requires, (a) “Cyber Appellate Tribunal” means the Cyber Appellate * Tribunal established under sub-section (1) of section 48 (* “Regulations” omitted) (b) “Cyber café” means any facility from where access to the Internet is offered by any person in the ordinary course of business to the members of the public. (c) “Digital Signature Certificate” means a Digital Certificate” means a Digital Certificate issued under sub-section (4) of section 35. (d) “Electronic Record” means data, record or data generated, image or sound stored, received or sent in an electronic form or micro film or computer generated micro fiche. (e) “Electronic Signature” means authentication of any electronic record by a subscriber by means of the electronic technique specified in the second schedule and includes digital signature. (f) “Electronic Signature Certificate” means an Electronic Signature Certificate issued under section 35 and includes Digital Signature Certificate”. (g) “Indian Computer Emergency Response Team” means an agency established under sub-section (1) of section 70 B. (h) “Information” includes data, messages, text, images, sound, voice, codes, computer programmes, software and databases or micro film or computer generated micro fiche. b. What does chapter 5 of IT Act, 2000, “Secure Electronic records & secure digital signatures” specify? Explain briefly. Ans : Secure electronic record : (1 mark) Where any security procedure has been applied to an electronic record at a specific point of time. Then such record shall be deemed to be a secure electronic record from such point of time to the time of verification. Secure digital signature : (2 marks) If, by application of a security procedure agreed to by the parties concerned, it can be verified that a digital signature, at the time it was affixed, wasunique to the subscriber affixing it capable of identifying such subscriber. created in a manner or using a means under the exclusive control of the subscriber and is linked to the electronic record to which it relates in such a manner that if the electronic record was altered the digital signature would be invalidated then such digital signature shall be deemed to be a secure digital signature. Security procedure. (2 marks) The Central Government shall for the purposes of this Act prescribe the security procedure having regard to commercial circumstances prevailing at the time when the procedure was used, including the nature of the transaction. the level of sophistication of the parties with reference to their technological capacity. the volume of similar transactions engaged in by other parties. the availability of alternatives offered to but rejected by any party. the cost of alternative procedures, and the procedures in general use for similar types of transactions or communications. c. What are the conditions under which Intermediary gets exemption from liability? Who are intermediaries: (1 mark) Intermediaries, such as hosts, transitory communication systems, information location tools etc are widely recognized as essential mechanism in the wheel of exercising the right to freedom of expression on the Internet. Most major jurisdictions around the world have introduced legislations for limiting intermediary liability in order to ensure that this wheel does not stop spinning. Act and its provision: (1 mark) India amended Section 794 of the Information Technology Act 2000(hereinafter referred to as the Act) in 2008 and joined the club of nations that limit intermediary liability. Though the guiding principles for intermediary liability policy in India are derived from the European Union E-Commerce Directive , such principles have been incompletely, incorporated into the Rules without adapting them to the requirements of India in the current context. Conditions under which Intermediary gets Exemption: (6 conditions---3 marks) a) Intermediary may claim that the takedown notice region is not applicable to search engines as they fall within the scope of the exemption offered by Rule 3(3)provision(a). The rule includes temporary or transient or intermediate storage of information automatically within the computer resource as an intrinsic feature of such computer resource. b) If the system of contextual advertisements has been subcontracted by Intermediary to another intermediary, as a result of which, Intermediary does not have any particular control over the advertisements. Thus he exempted. c) If the author had not established himself as an affected party then the intermediary will be exempted from liability d) If the intermediary builds sufficient grounds to claim benefit of the exemption in Rule 3(3) provision(a). This provision is essentially meant to provide an exemption for techniques such as packet switching, statistical multiplexing or any other store and forward techniques. e) If an intermediary had not appointed a Grievance Officer as required under Rule 3(11) or modified its content policy as required under Rule 3(2) then he or she may be exempted. f) Intermediary will not get exemption if he or she deletes the comments from the takedown notice intentionally. The comments include the following: (i) The comment on the impugned URL is "racially and ethnically objectionable" as provided in Rule 3(2)(b) of the Rules (ii) The comment on the impugned URL is "hateful" as provided in Rule 3(2)(b) of the Rules. (iii) The comment on the impugned URL is "disparaging" as provided in Rule 3(2)(b) of the Rules. (iv) The comment on the impugned URL is "defamatory" as provided in Rule 3(2)(b) of the Rules. (v) The comment on the impugned URL "violates any law for the time being in force" as provided in Rule 3(2)(e) of the Rules read with Sections 124A, 153A, 153B, 292A, 295A and 499 of the Indian Penal Code 1860. d. What does chapter 9 of IT Act, 2000, “Penalties & Adjudication” cover? Five major points of focus. (5 marks) 1.Penalty of damage of computer, computer system, etc. If any person without permission of the owner or any other person who is incharge of a computer, computer or computer network,(a) accesses or secures access to such computer, computer system or computer network; (b) downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium; (c) introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network; (d) damages or causes to be damaged any computer, computer system or computer network, data, computer data base or other programmes residing in such computer, computer system or computer network; (e) disrupts or causes disruption of any computer, computer system or computer network; (f) denies or causes the denial of access to any person authorised to access any computer, or computer network by any means ; (g) provides any assistance to any person to facilitate access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made thereunder ; (h) charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer network, he shall be liable to pay damages by way of compensation not exceeding one crore rupees to the person so affected. Explanation.- For the purpose of this section,(i) "computer contaminant" means any set of computer instructions that are designed(a) to modify, destroy, record, transmit data or programme residing within a computer, computer system or computer network; or (b) by any means to usurp the normal operation of the computer, computer system, or computer network; (ii) "computer data base" means a representation of information, knowledge, facts, concepts or instructions in text, image, audio video that are being prepared or have been prepared in a formalised manner or have been produced by a computer, computer system or computer network and are intended for use in a computer, computer system or computer network; (iii) "computer virus" means any computer instruction, information, data or programme that destroys, damages, degrades or adversely affects the performance of a computer resource or attaches itself to another computer resource and operates when a programme, data or instruction is executed some other event takes place in that computer resource; (iv) "damage " means to destroy, alter, delete, add, modify or rearrange any computer resource by any means. 2. Penalty for failure to furnish information, return, etc. If any person who is required under this Act or any rules or regulations made thereunder to(a) furnish any document, return or report to the Controller or the Certifying Authority fails to furnish the same, he shall be liable to a penalty not exceeding one lakh and fifty thousand rupees for each such failure; (b) file any return or furnish any information, books or other documents within the time specified therefore in the regulation fails to file return or furnish the same within the time specified therefor in the regulations, he shall be liable to a penalty not exceeding five thousand rupees for every day during which such failure continues; (c) maintain books of account or records, fails to maintain the same, he shall be liable to a penalty not exceeding ten thousand rupees for every day during which the failure continues. 3. Residuary penalty Whoever contravenes any rules or regulations made under this Act, for the contravention of which no penalty has been separately provided, shall be liable to pay a compensation not exceeding twenty-five thousand rupees to the person affected by such contravention or a penalty not exceeding twenty-five thousand rupees. 4. Power to adjudicate (1) For the purpose of adjudging under this Chapter whether any person has committed a contravention of any of the provisions of this Act or of any rule, regulation, direction or order made thereunder the Central Government shall, subject to the provisions of subsection (3), appoint any officer not below the rank of a Director to the Government of India or an equivalent officer of a State Government to be an adjudicating officer for holding an inquiry in the manner prescribed by the Central Government. (2) The adjudicating officer shall, after giving the person referred to in sub-section (1) a reasonable opportunity for making representation in the matter and if, on such inquiry, he is satisfied that the person has committed the contravention, he may impose such penalty or award such compensation as he thinks fit in accordance with the provisions of that section. (3) No person shall be appointed as an adjudicating officer unless he possesses such experience in the field of Information Technology and legal or judicial experience as may be prescribed by the Central Government. (4) Where more than one adjudicating officers are appointed, the Central Government shall specify by order the matters and places with respect to which such officers shall exercise their jurisdiction. (5) Every adjudicating officer shall have the powers of a civil court which are conferred on the Cyber Appellate Tribunal under sub-section (2) of section 58, and(6) all proceedings before it shall be deemed to be judicial proceedings within the meaning of sections 193 and 228 of the Indian Penal Code; (7) shall be deemed to be a civil court for the purpose of section 345 and .46 of the Code of Criminal Procedure, 1973. 5. Factors to be taken into account by the adjudicating officer While adjudging the quantum of compensation under this Chapter, the adjudicating officer shall have due regard to the following factors, namely :(a) the amount of gain of unfair advantage, wherever quantifiable, made as a result of the default; (b) the amount of loss caused to any person as a result of the default; (c) the repetitive nature of the default. 7. Attempt any three of the following: a. List out the basic principles of design rights. The basic principles of design rights are: (Any 5 rights with brief explanation---5 marks) 1. The rights of exclusive use of design is registered under the Designs Act 2000. This Act is enforced from the date of registration. 2. If the Design Act has been registered, it can be further extended from the original period of registration. 3. Right to protect the design from piracy which causes infringement. Any person responsible for infringing a registered design and found guilty is liable to a fine of rupees not exceeding 25000. 4. The registered owner has the right to file a suite for recovery of damages so that his reputation does not get affected and he can recover this by getting an amount not exceeding Rs. 50000. 5. The registration of design includes the provisions of section 20 of Design Act 2000, which includes that the government can use certain design under various circumstances when the article is not made available to the public at reasonable prices. 6. Section 11 of Designs Act 2000 provides the term for registration which may be extended to further 5 years till a maximum period of 15 years. b. Explain in brief the enforcement of data protection. (All 6 points with brief explanation---5 marks) If the information commissioner finds that the DPA has been breached by a DC, he serves an enforcement notice on DC The notice indentifies the breach or commission, and specifies how to correct it Failure to comply is an offence However, a DC may appeal t the DP tribunal With the approval of the director of Public Prosecutions, legal proceedings may follow, which could result is a fine. Enforcement data protection act in media. The DPA has special provision for journalism, and artistic or literary purposes Basically, journalists may hold personal data for journalistic purposes only if the data are necessary to reconcile the rights to privacy with the rules governing freedom of expression. 15 So, investigable journalists & political satirists or commentators are not treated as Data Controllers Enforcement Data protection in internet The UK/EU legislation seems fairly strong. But can trans-border transfer of data c. What are the rights granted for registration of design? Ans: (5 rights---5 marks) 1. A person has the right for exclusive use of the design which is subject to the provision of Design Act, 2000. Hence the Design registered under this act can be used from the date of registration. 2. If the design provision gets expired then the applicant can extend the period of design by paying the prescribed fees. 3. Every person has a right to protect the design from piracy. Any person responsible for infringing the registered design then he is liable to pay a fine of a sum not exceeding 25,000. 4. Under section 20 of the design Act, 2000. There are exceptions in case of using the design related to the government. Hence the government can use the registered design which prohibits other person to use this design under certain circumstances 5. Section 11 of the Design Act, 2000 has provided extension period if the registered design gets expired. Hence the maximum period of extending the registered design is for 15 years d. Explain how licensing for technology is considered. Ans: (4 points---4 marks) 1. By a technology licensing agreement, the licensor authorizes the licensee to use the technology under certain agreed terms and conditions. 2. It is therefore, a contract freely entered into between two parties and contains terms & conditions so agreed upon. 3. Through a technology licensing agreement, it is possible to improve the quality of existing product or develop and manufacture a new product by using the patents or trade secrets owned by others. 4. This may also include entering into a new market or extending in the existing market for a product by acquiring the patent rights. For example: (1 mark) Tata Steel has obtained a process technology patent for making hybrid rollers used in sinter plants. This patent is now licensed to Jyoti Cero Rubber to get potential revenue over next three years. Looking at the wider market Tata Steel is licensing this technology to other competent parties. e. Explain Copyright issue in India. Explain Copyright in WWW. (3 issues with explanation---5 marks First issue--1 mark Remaining 2 issues---4 marks) i. The traditional concept of copyright has given place to a more complex meaning to cope up with the advancements in the nature of works and the mediums of their expressions that merit protection under the Copyright Law. Innumerable issues arise in the process of a virtual tug of war between the copyright holders and their infringers. Stringent remedies are ii. iii. devised to safeguard the intellectual property rights and amendments have been made in the legislation governing IPR in India and Information Technology Act, 2000 has been enacted to be in tune with the international concerns reflected in the WIPO Treaties and other International documents. The Copyright Act, 1957 has been enacted by the Parliament in the exercise of its legislative powers conferred by Entry 49 of the Seventh Schedule to the Constitution of India with a view to amend and consolidate the law relating copyright. As provided in Section 16, no person shall be entitled to copyright or, any similar right in any work, whether published or unpublished, otherwise than under and in accordance with the provisions of this Act or of any other law for the time being in force. The Parliament enacted the Information Technology Act, 2000 which provides legal recognition to electronic record and digital signatures. The expression “electronic record” as defined by Section 2(1)(t) of that Act means, data, record or data generated image or sound stored, received or sent in an electronic form or micro film. Tampering with computer source documents is made an offence under Section 65 of the Act, which provides that, whoever knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force, shall be punishable with imprisonment upto three years, or with fine which may extend upto two lakh rupees, or with both. f. What is Cyber Appellate Tribunal? What are its powers? About Cyber Appellate Tribunal: (1 mark) Procedure and powers of the Cyber Appellate Tribunal (point 1 for 1 mark Point 2 for 2 marks Point 3 for 1 mark) (1) The Cyber Appellate Tribunal shall not be bound by the procedure laid down by the Code of Civil Procedure, 1908 but shall be guided by the principles of natural justice and, subject to the other provisions of this Act and of any rules, the Cyber Appellate Tribunal shall have powers to regulate its own procedure including the place at which it shall have its sitting. (2) The Cyber Appellate Tribunal shall have, for the purposes of discharging its functions under this Act, the same powers as are vested in a civil court under the Code of Civil Procedure, 1908, while trying a suit, in respect of the following matters, namely : (a) summoning and enforcing the attendance of any person and examining him on oath; (b) requiring the discovery and production of documents or other electronic records; (c) receiving evidence on affidavits; (d) issuing commissions for the examination of witnesses of documents; (e) reviewing its decisions; (f) dismissing an application for default or deciding it ex parte; (g) any other matter which may be prescribed. (3) Every proceeding before the Cyber Appellate Tribunal shall be deemed to be a judicial proceeding within the meaning of sections 193 and 228, and for the purpose of section 196 of the Indian Penal Code and the Cyber Appellate Tribunal shall be deemed to be a civil court for the purposes of section 195 and Chapter XXVI of the Code of Criminal Procedure, 1973.
© Copyright 2024