Intellectual Property Protection: The Basics. Intellectual property protection is a complex duty with aspects that may fall under the purview of Legal, IT, Human Resources and other departments. Ultimately a Chief Security Officer or Risk Committee often serves to unify intellectual property protection efforts. It may help to think of it as intangible proprietary information. The formal definition, according to the World Intellectual Property Organization is creations of the mind — inventions, literary and artistic works, symbols, names, images, and designs used in commerce. IP includes but is not limited to proprietary formulas and ideas, inventions (products and processes), industrial designs, and geographic indications of source, as well as literary and artistic works such as novels, films, music, architectural designs and web pages. Authoritative sources report that each year, intellectual property theft costs U. S. IP registered in one of those categories with state and federal agencies is protected by law, and if infringed upon or otherwise abused, the infringers can be prosecuted. Patents cover tangible things. They can also be registered in foreign countries, to help keep international competitors from finding out what your company is doing. Once you hold a patent, others can apply to license your product. Patents can last for 2. It often connects a brand with a level of quality on which companies build a reputation. Trademark protection lasts for 1. But trademarks don't have to be registered. If a company creates a symbol or name it wishes to use exclusively, it can simply attach the TM symbol. The PROTECT IP Act Intellectual Property enforcement and musicians. The Landscape for Online Intellectual Property. The PROTECT IP Act also encourages. Comers to the subject of copyright and related rights. Intellectual property rights protect the interests of creators. That act is the making of copies of the. This effectively marks the territory and gives the company room to prosecute if other companies attempt to use the same symbol for their own purposes. A copyright protects the expression of an idea, but not the idea itself. The owner of a copyrighted work has the right to reproduce it, to make derivative works from it (such as a movie based on a book), or to sell, perform or display the work to the public. You don't need to register your material to hold a copyright, but registration is a prerequisite if you decide to sue for copyright infringement. A copyright lasts for the life of the author plus another 5. It is covered by state, rather than federal, law. To protect the secret, a business must prove that it adds value to the company - that it is, in fact, a secret - and that appropriate measures have been taken within the company to safeguard the secret, such as restricting knowledge to a select handful of executives. Coca- Cola, for example, has managed to keep its formula under wraps for more than 1. If the head of your R& D department has a eureka moment during his morning shower and then applies his new idea at work, that's intellectual property too. In this area a little bit of paranoia is quite helpful, because people really are out to get you. Consider these real- life examples. Employees were instructed to transfer all such inquiries to the security office, but the calls kept coming. It was later revealed that calls came from a research company hired by the competition. But the information he was giving up in return caused his employer, formerly the market leader, to lose three major bids in 1. The invitations appealed to them as scientists - they wanted to share information about their work with peers. The countries saw this kind of intelligence gathering as cheaper than research and development. To do that, CSOs must communicate on an ongoing basis with the executives who oversee intellectual capital. So meet with the CEO, COO and representatives from HR, marketing, sales, legal services, production and R& D at least once a quarter. Corporate leadership must work in concert to adequately protect IP. Make a map of your company's assets and determine what information, if lost, would hurt your company the most. Then consider which of those assets are most at risk of being stolen. Putting those two factors together should help you figure out where to best spend your protective efforts (and money). If your company data is proprietary, put a note to that effect on every log- in screen. This seems trivial, but if you wind up in court trying to prove someone took information they weren't authorized to take, your argument won't stand up if you can't demonstrate that you made it clear that the information was protected. Lock the rooms where sensitive data is stored, whether it's the server farm or the musty paper archive room. Use passwords and limit employee access to important databases. When you talk in specific terms about something that engineers or scientists have invested a lot of time in, they're very attentive. That's why an IP protection effort that counts on firewalls and copyrights, but doesn't also focus on employee awareness and training, is doomed to fail. The category of data loss protection (or data leakage prevention) grew quickly in the mid- 2. Symatec's acquisition of Vontu being a milestone in that process), although many independent vendors still exist. INTELLECTUAL PROPERTY RIGHTS (IPR) WHAT IS AN IPR? Intellectual Property Rights are legal rights, which result from intellectual activity in industrial. Protect and Survive: Managing Intellectual Property. Intellectual Property Law in India July 2015. Intellectual Poet La in Inia. The Copyright Act, 1957 has been amended to protect computer programs as “literary. Can Help Protect Intellectual Property. Act; Open Government. Companies like Facebook and Twitter show that intellectual property isn't the must. They not only locate sensitive documents, but also keep track of how they are being used, and by whom. FREE CSO Insider registration required. If someone is scanning the internal network, your internal intrusion detection system goes off, and typically somebody from IT calls the employee who's doing the scanning and says, . Then later, the night watchman sees an employee carrying out protected documents, and his explanation is . This is why communication gaps between infosecurity and corporate security groups can be so harmful. IP protection requires connections and communication between all the corporate functions. The Legal department has to play a role in IP protection, and so does Human Resources, and Information Technology, and Research and Development, and Engineering, and Graphic Design.. Think holistically both to protect and to detect. Thinking through such tactics will lead you to consider protecting phone lists, shredding the papers in the recycling bins, convening an internal council to approve your R& D scientists' publications, or other ideas that may prove worthwhile for your particular business. Sounds a little extreme. Some of these forces come in the guise of . Others are outright spies hired by competitors, or even foreign governments, who'll stop at nothing, including bribes, thievery, or even a pressure- activated tape recorder hidden in your CEO's chair. But most threats to your information operate in a gray zone.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2017
Categories |