Research on intellectual property rights and guidelines

Assignment Help Other Subject
Reference no: EM13800060

INTRODUCTION.

Intellectual property can be defined as those rights that are meant to protect an entity's inventions, book authorship, arts, industrial designs, trademarks and trade secrets. ABA. (2010). These rights are derived from the intellectual property laws that include patent, copyright and trademark.

How can you protect your IT product or service idea?

Understand the nature of the idea or IT product that you seek to protect. Can the idea be protected by utility patent? If yes then compile a disclosure of the IT product in the form of a written description. This disclosure should clearly illustrate how the IT product/idea works, how it can be executed, and what improvement does the new invention bring in that specific sphere of influence. Singh, Y. (2012).

It is important to clearly outline the date of conception of your idea or IT product. Patent law dictates the importance of proving the date of invention and the date that you practically and successfully tested the idea- a process usually referred to as ‘actual reduction practice'. Witnesses play a vital role in this process as they'll testify the fact that the process of actual reduction to practice was successfully accomplished on a certain day. Keep written records on the date the idea was invented and when it was put into practice.
Keep your idea or IT product confidential, don't unnecessarily disclose it to anyone around, if you have to disclose, then disclose in confidence. Obtain a written confidential disclosure agreement form the individual to whom you disclose the idea. The agreement should clearly show that the person intents to keep your idea confidential.

Another significant way of protecting your IT product or idea is by keeping it as a trade secret. This means keeping the mechanism, tools, formula, process that culminated to the conception of the idea a secret such that no one else can design that product.
What are the consequences if you do not take the legal procedure required to protect your IT product or service idea?
For instance, if you have a domain name without its federal trademark registration, there is the possibility of the risk that some of other entity with a registered trademark may already have registered that exact domain name. This can bar you from using that domain name.

Without having made use of the statutory notice for a registered trademark, you can't possibly deter other people and business entities from using your idea or business product. This means that you can't sue for infringement rights, other damages or profits.

Failure to take the legal procedures to protect one's idea or product incapacitates the owner in the sense that they can't protect other entities from stealing or copying your unique inventions, products design, and the brand of your product. Turner, J. D. C. (2010).
Search and discuss if there is any difference between IT products and other products in terms of legal protection issues.

Food products have a quite unique nature of protection policy. For instance, the European Union has designed three legal protection policies informed by the geographical setting within which these products come from. Traditional Specialties Guaranteed (TSG), Protected Design of Origin (PDO) and Protected Geographical Indication (PGI) are the basic trademarks in the European Union that protect the quality and brand of agricultural products from the region.

The most distinctive difference between IT products and other products in regard to legal protection issues lies within the realms of the fact that Intellectual property law specifically protects rights of property deemed to be intangible. On the other hand, other property laws seek to protect rights of properties deemed to be physical or tangible. Progoff et al. (2012).

Other observable differences are seen on the nature of the various intellectual property rights and what they specifically protect.
Patents are basically meant for inventions. This geared towards ensuring that the idea or product is remains safe with the inventor and that other entities are prevented from employing, selling or practicing similar products. This law gives the owner of the idea the right to make, use and sell originally qualifying product of invention. In regard to IT products, software patents play a significant role in protecting salient features of a program that can't be possibly protected under laws of copyright and trade secrets.

Trademarks are used to identify the source of commodity/idea or a service. A trademark helps to develop and distinguish commodities from those of another producer. Inventors and entrepreneurs in general use trademarks to protect their inventions, brand and products from infringement. A good example is the Nike tick for Nike products.

The term ‘Copyright' refers to an Intellectual property right that seeks to protect original artistic works such as music, sound records, literary works, photography, films and broadcasts. This right comes into effect as soon as that product is created.

It is a general rule that you should cite your reference sources when you are borrowing ideas from other authors. Why is this important and what are the consequences if you do not cite your reference sources?

Referencing demonstrates that the writer is well read and is proficient in researching and analyzing existing works. This is an added advantage to their work because it will be perceived to be well detailed and articulated. This may help a scholar attain a good mark in their work.

Citing sources depicts the responsibility of a researcher who is keen enough to identify, acknowledge and give credit for the work of other authors. Citing help avoid the possibility of doing plagiarized work. Referencing enables the reader to track down the academic sources that a writer/researcher has used for further reading and understanding of concepts. Russell, C. (2012).

Some of the consequences for failing to effectively cite one's work include suspension from an academic institution or even being sued in court for plagiarism-this may attract prison sentence.

There are technical tools to help in detecting plagiarism. Can such tools be used to detect borrowed ideas? If yes, give examples.
There exist a good number of plagiarism detection tools such as the Grammarly plagiarism checker, Articlechecker, Plagium, PlagiarismDetect, Duplichecker, Doc Cop and Viper. These tools help detect plagiarism within someone's text, collision I.e. checking similarity between two papers. Some of these tools such as Plagium work in several languages. Stech, M. T., Anderson, J. E., & WIPO. (2010).

Can you use the research paper written by you for a previous class as a reference for your current research? Why or why not?

Yes I can. However, it's important that I acknowledge and cite the works of my previous research basically because I intend to avoid the possibility of self-plagiarism that is defined by the American Psychological Association as the practice of presenting own ideas as if they were new.

Is this considered self-plagiarism? What is meant by self-plagiarism?

The act of using a research paper that has been previously written by same author as a reference in a current research-without citing the previous work, is termed as self-plagiarism. It is clearly evidenced by the significant overlap of different publications in a single piece of work.

Self-plagiarism basically refers to the act of reusing a whole or part of previously disseminated work by the original author without specifically indicating the reference of the previous work in the current dissemination. Most common forms of self-plagiarism include but not limited to; duplicate publication, segmented publication and redundant publication. Ciulla et al. (2014).

As a desktop help desk support specialist, you discovered a new way to prevent hackers from breaking into company networks while working for a telecommunication company. Is it ethical for you to sell your discovery to an IT security company without the permission from your employer? Why or why not?

I should thoroughly look into all prior employment agreements including but not limited to confidentiality and invention agreements between me and my employer. Qu. (2012). Technology oriented companies have a specific employee agreement that dictates the employees to assign all inventions, creations and other possible intellectual properties to their employee. If I came up with a new idea in my current job as I was executing my roles at the work place, then that idea may be termed as my employee's in regard to the existing inventions agreement with my employer. Therefore, I should seek the permission of my employer.

How can employers protect their legal rights?

Employers can protect their legal rights by taking the following course of actions;

Seeking the intervention of a federal court.

By making known, their legal rights to their employees. This will deter possible ignorance and infringement on their rights.
A very reliable way that employers protect their legal rights is through use of employee monitoring (the act of an employer to monitor employees' behaviors and actions during the official working hours). Progoff et al. (2012). Employers are generally concerned with monitoring their employees' code of conduct to ensure that it results into increased productivity of the company's brand, besides ensuring their ideas, inventions and trade secrets are kept confidential.

Reference no: EM13800060

Questions Cloud

Design a simple normal not 3d electric wiring diagram for ho : Design a simple normal not 3D, electric wiring diagram for home with 3 bad room 1 master 2 medium  w/basement and garage, 2 bath, kitchen with electric oven and microwave  , laundry and AC with heat.
Determine the demand for the products : Product description and usage - Factors that determine the demand for the products
Write a paper on why academic and professional ethics matter : Write a 4-5 page paper on the topic "Why academic and professional ethics matter" In your paper, include relevant support from the unit readings
Erikson life span theory : In your own words, list and describe the each stage of Erikson's Life Span Theory. Your list should include the crisis (e.g., trust vs. mistrust) and the corresponding possible outcome/strength gained
Research on intellectual property rights and guidelines : Research on Intellectual property rights and guidelines.
Different prices for prescription drugs : U.S. pharmaceutical companies charge different prices for prescription drugs to buyers in different nations, depending on elasticity of demand and government-imposed price ceiling.
Discuss technology literacy assessment tla define tla and : Discuss Technology Literacy Assessment (TLA). Define TLA and include a discussion of why it is important.
How your employees should communicate with the public : You are part of a team at a new company where you will need to create a few general, or very specific, guidelines or policies for how your employees should communicate with the public and/or other businesses.
Build a high quality reputation : When entry occurs in a monopolistically competitive industry - Why would a competition regulator need details relating to how firms are competing to cut prices, raise output levels, or build a high quality reputation?

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd