Professional Documents
Culture Documents
ISSN 2229-5518
ABSTRACT - The ability of computer to share data with other computers with the help of networking has led to a major
telecommunication revolution. Networking has led to a concept of cyberspace. With the advent of the Internet, some new problems in
the field of intellectual property law have been appeared. Copyright and Trademark are the key issues of intellectual property.
Infringement of these rights over the internet is common now a day and these includes Linking and Framing, Uploading of copyright
material, Downloading of copyright material, Domain Name disputes like Cyber squatter, Cyber parasite, Cyber twins and Reverse
domain name hijacking.
KEY WORDS – Cyberspace, Copyright, Trademark, Linking, Framing, Cyber squatter, Cyber parasite, Cyber twins and Reverse
domain name hijacking
—————————— ——————————
2.1.2 Framing
2.1 Linking and Framing: Framing is another type of dynamic connection that is
similar to inline linking. It allows the web-designer to
The websites contains enormous amount of
incorporate or pull in an entire external site or portions thereof
information much of it with varying degree of copyright
and surround it with frames of his own creation. The effect as
protection. Almost everything on the web is protected by
with inline is that the external site appears to be part of the
copyright law. Websites are compositions of materials often
local site and the URL remains unchanged. 8
consisting of words, graphics, audio and video that are
expressed to the consumer as information content.4 One of the first cases over hypertext linking in the
U.K. is that of Shetland times Ltd. v. Wills9. The claimant
The owners and websites developers carefully select
owned and published a newspaper called the Shetland times
the content to sell the company’s product or service. The
(the Times) and made editions of newspaper available on the
subject matter expressed in the site is an electronic publication
Internet. The second defendant provided a news reporting
of this content. Since designing, producing and maintaining a
service under the name of the Shetland News (the News). The
sophisticated web-site is very expensive. So protecting the
first defendant was the managing director of the news. The
content from infringement is extremely important.
defendants established a web site and included among the
At present it is easy to violate a copyright owner’s headlines on their front page a number of headlines appearing
exclusive right to copy the material. Everyone with a computer in issues of the Times. These headlines were verbatim
and on internet connections creates his own web pages and
thus becomes a publisher. 5
Ibid.
6
Available at:
http://www.fenwick.com/docstore/publications/ip/ip_rights_on_the_i
3
Available at: nternet.pdf (last visited on 20th March 2012)
7
http://etheses.nottingham.ac.uk/1197/1/initial_submission_2.pdf (last Ibid.
visited on 20th March 2012) 8
Ibid.
4 9
Ibid. (1997) F.S.R. 604
2
IJSER © 2012
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 3, Issue 6, June-2012 3
ISSN 2229-5518
reproductions of the claimants headlines, by clicking on one of files that were catalogued on Napster’s central server. These
these headlines the Internet user could again access to the files could be downloaded directly from user’s hard drivers
relative text in the Times. By passing the front page the Times. over the Internet. A&M records and other record companies
brought copyright infringement action against Napster in U.S.
In LFG, LCC v. Zapata Corp.10 the defendant District Court and Court decided in favour of plaintiff.
registered domain name zapte.com for carrying on business
over the internet. The plaintiff is providing financial service 2.4 Position under Indian Law
under the service mark Zap futures. The defendant’s web site
is having three hyperlinks, which could connect users to other A hyperlink used by a web site does not directly
financial service website including that of plaintiff and his cause copying of any substantive content by anyone, but
competitors. The plaintiff objected this hyperlink on the instead merely provides a pointer to another site. A surface
ground that wrong impression is created in the minds of the link to a home page does not require permission. This position
public because they may associate him with his competitors. is based on the theory that going online creates an implied
licence for anyone with a computer to view the web-site.15
In Washington Post Co. v. Total News Inc. Total
news11 operated a website providing links to web-sites of many Computer Program:
news purveyors including the Washington Post, Time Cable
News Network (CNN), times Mirror, Dow Jones and Reuters. A computer program or software program or
By clicking on the links, the web-sites of these news purveyors program is a sequence of instructions written to perform a
were displayed in the frame of Total News. The frame specified task for a computer. A computer requires programs
contained the ‘Total News’ logo Total News URL and to function typically executing the programs instructions in a
advertisements managed by Total News. The claimants central processor.16
brought an action against the defendant alleging copyright
A computer program consists of many instructions
infringement and they got succeeded.
that tell a computer what to do. Everything done on a
2.2 Uploading Of Copyright Material computer is done by using a computer program.
As it is easy and common for copyright material to be Computer program is stored as a file on the user’s
transmitted over the Internet, many Internet users assume that hard drive when the user runs the program, the file is read by
the fact that a material is available electronically entitles them the computer and the processor reads that data in the life as a
to upload it to their own web-sites.12 list of commands or instructions. The computer then does what
the programs tells it to do.17
2.3 Downloading Of Copyright Material
Programming languages- C, C++, Pascal, BASIC,
Once the unauthorized copyright material has been FORTRAN, COBAL and LISP. Every program must be
uploaded and made available, the next possible thing is that translated into a machine language that the computer can
Internet users will download it from the internet. There is little understand.18
doubt that users are liable for downloading such material
without the authority of the copyright owners. However 2.5 Indian Copyright Act, 1957
copyright owners are reluctant to bring actions against
Sec. 2(ffb) – Computer
millions of individual infringers. Much of the attention has
been paid to the possibility of holding liable those parties who ‚Computer‛ includes any electronic or similar device
provide the equipment or facilities used for infringing having information processing capabilities.
activities.13
Sec. 2(ffc) – ‚Computer Programme‛
In A&M Record Inc. v. Napster Inc.14 Napster
facilitated the transmission of MP3 files between and among its ‚Computer Programme‛ means a set of instructions
users. The company distributed its file sharing software for expressed in words, codes, schemes or in any other form,
free via its web site through the process called ‘peer to peer’ including a machine readable medium, capable of causing a
(P2P) file sharing. Its users could search and share MP3 music
15
R.K. Chaubey, Cyber Crime and Cyber Law, 1 st ed. (kolkatta:
10
78 FS. Supp. 2d.731, 733 Kamal Law House, 2008), pp712 to 714.
11 16
No. 97 Civil 1190 (PKL). Available at : http:/www.modula2org./tutor/chapterI.pht (last
12
Supra note, 3 visited on 20th March 2012)
13 17
Ibid. Ibid.
14
239 F. 3d. 1004 (9th Cir. 2001) 18
Ibid.
3
IJSER © 2012
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 3, Issue 6, June-2012 4
ISSN 2229-5518
computer to perform a particular task or achieve a particular trademark service and definition of the term ‚registration‛.
result. Besides this in view of developments in trading and
commercial practices, increasing globalization of trade and
2.6 Software Piracy industry, the need to encourage investment flows and transfer
of technology need for simplification and harmonization of
The illegal use or distribution of software is protected trade and to fulfill obligations of GATT and TRIPS.
under intellectual property laws. Software piracy includes
Trademarks are names and symbols that a company
End user piracy- It is illegal to copy or possess uses to identify its product or service in the market place.
software without licensing for each copy. Individual Trademarks are the laws recognition of the psychological
users and companies alike must acquire enough function of symbols. Trademarks rights consists of a particular
licenses to cover their software installations. Volume logo, a company name, a unique packaging style etc.
licensing applies only to windows Desktop upgrades Trademarks serve several useful functions.
not to the full windows operating system.
Manufacturer piracy- It is illegal for a computer The development of Internet has brought a new set of
manufacturer to copy software and preinstall it challenges of the trademark law of most importance is the
without permission on more than one computer. interface between trademarks and domain names.
Internet piracy- It is illegal to offer unauthorized
copies of software for download over the Internet. If Domain name very simple is the address of a
software is available on the internet, make sure the particular site on the internet not much different from a
software publisher has authorized this distribution. telephone number. On the web to communicate with or access
Counterfeiting- It is illegal to manufacture a simple specific site, each site must have an address. Internet
unauthorized copies of software and distribute those protocol address act as such address.21
copies in packaging that reproduces or resembles that
of manufacturer. Counterfeit registration cards with Machines communicating over the Internet however
unauthorized serial numbers are often included in do not actually ‘talk’ in terms of domain names. Instead
these packages. domain name is a proxy for the I.P. address, which is like a
Online auction- It is illegal to resell software in telephone number, although there is no logical correspondence
violation of the original terms of sale, to resell between the IP number and the domain name.22
software marked not for resale.19
Classification of domain names:23
In Microsoft Corporation v. Yogesh Popat: The 20
defendants were engaged in the business of assembly and sale A specific domain name can be divided into
of computers since 1996 and were selling computers loaded
Top-level domain [TLD]
with pirated versions of Microsoft Software. Microsoft placed a
trap order with the defendants through a Microsoft employee Second-level domain [SLD]
and the defendants sold to this employee a computer
preloaded with Microsofts pirated software. Thereafter, Sub-domain [SD]
Microsoft filed a suit against the defendants for permanent
injunction and also damages. Defendants did not appear at all Using law.Harvard.edu as an example
and the court granted the damages of Rs. 2 Crore and
injunction. Www. Law. Harvard.edu
19
Meena Amar, lectures on Cyber Laws, 1st ed. (Hyderabad: Asia 21
Supra note 15 at pp. 727- 729
22
Law House, 2011), pp.71 to 72. Ibid.
20 23
CS (OS) no. 103 of 2003 Ibid.
4
IJSER © 2012
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 3, Issue 6, June-2012 5
ISSN 2229-5518
Again top-level domains can be classified into generic relevant to note that there is nothing wrong with the practice
and country code TLD of reserving a domain name. Often, cyber squatters register
words or phrases they hope will someday be sought after by
‘.com’ by a commercial enterprise new companies or new business.26
3.1.3Cyber Twins
4. Conclusion
32
WIPO case no. D2011-110
33
Supra note no. 24
6
IJSER © 2012
http://www.ijser.org