Lecture5

Lecture5 - TEL2813/IS2820 Security Management Legal &...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
TEL2813/IS2820 Security Management April 14, 2006
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Laws and Security Federal and state laws affect privacy and secrecy Rights of individuals to keep information private Laws regulate the use, development and ownership of data and programs Patent laws, trade secrets Laws affect actions that can be taken to protect secrecy, integrity and availability
Background image of page 2
Copyrights Designed to protect expression of ideas Gives an author exclusive rights to make copies of the expression and sell them to public Intellectual property (copyright law of 1978) Copyright must apply to an original work It must be done in a tangible medium of expression Originality of work Ideas may be public domain Copyrighted object is subjected to fair use
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Copyright infringement Involves copying Not independent work Two people can have copyright for identically the same thing Copyrights for computer programs Copyright law was amended in 1980 to include explicit definition of software Program code is protected not the algorithm Controls rights to copy and distribute
Background image of page 4
Patent Protects innovations Applies to results of science, technology and engineering Protects new innovations Device or process to carry out an idea, not idea itself Excludes newly discovered laws of nature 2+2 = 4
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Patent Requirements of novelty If two build the same innovations, patent is granted to the first inventor, regardless of who filed first Invention should be truly novel and unique Object patented must be non-obvious Patent Office registers patents Even if someone independently invents the same thing, without knowledge of the existing patent Patent on computer objects PO has not encouraged patents for software – as they are seen as representation of an algorithm
Background image of page 6
Trade Secret Information must be kept secret If someone discovers the secret independently, then there is no infringement – trade secret rights are gone Reverse-engineering can be used to attack trade secrets Computer trade secret Design idea kept secret Executable distributed but program design remain hidden
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Comparison Copyright Patent Trade secret Protects Expression of idea Invention Secret information Object made public Yes: intention is to promote Design filed at patent office No Requirement to distribute Yes No No Ease of filing Very easy, do-it- yourself Very complicated; specialist lawyer suggested No filing Duration Life of human originator or 75 years of company 19 years Indefinite Legal protection Sue if copy sold Sue if invention copied Sue if secret improperly obtained Examples Object code, documentation Hardware Source code
Background image of page 8
Employee and Employer Rights Employees generate idea and products Ownership is an issue in computer security Rights of employer to protect the works of employees Ownership of products Eve writes programs at night and sells it herself
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 63

Lecture5 - TEL2813/IS2820 Security Management Legal &...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online