Professional Documents
Culture Documents
| 1
R ISS
’’IPR SUES IN CYBE
C RSPA
ACE’’’
DISSER
D RTATION
N TOWA
ARDS FU
ULFILLM
MENT OF
F THE
AW
WARD OF
O DIPLO
OMA IN CYBER
R LAWS.
SUBMMITTED TO:
T
DR D.Y.PAT
D IL LAW COLLEGGE,PIMP
PRI PUN
NE
U
UNIVERS SITY OF PUNE
PREP
PARED BY:
B
MS
S.SHUBH
HANGI DADASA
D AHEB GADADE
G E
UNDER
R THE GUIDANC
G CE AND
D SUPER
RVISION
N OF:
PROOF.PAR
RAG NAV
VANDERR
ASSSISTANNT PROFFESSOR R,
DR.D
D.Y.PATIIL LAW COLLEG
C GE,PIMPPRI ,PUN
NE
U
UNIVERS SITY OF PUNE
Place
e and Da
ate of Su
ubmissio
on:
Dr.. D. Y. Patil
P Law
w College, Pimp
pri, Pune
e
Marrch, 2019
P a g e | 2
“IPR ISSU
UES IN
I CY
YBER ACE”
RSPA
A Project
P on
o Digitaal Signatu
ure towarrds the fu
ulfillmen
nt for the
Awarrd of Diplloma in Cyber
C Laaw Subm
mitted to the
t Punee Universsity
Subm
mitted byy:
MIISS. SH
HUBAH
HNGI DADA
D ASAHE
EB GA
ADADE
E
Under the
t guidaance:
PROF
F. PAR
RAG NA
AVAN
NDER
Dr.
D D. Y. Patil Law
w College, Pimprri, Pune
March, 20199
P a g e | 3
DR.D.Y
Y.PATIL U
UNITECH
H SOCIETTY’S
DR.D.Y.PATTIL LAW COLLEGE,
P
PIMPRI, PUNE‐4
411018
CER
C RTIIFIC
CAT
TE
This is to certify that Ms.Sh
hubhangi Dadasaheeb Gadade , a studeent of Diplloma
in Cybeer Law Seaat No.__________________ of Dr.
D D. Y. Paatil Law College
C Shee has
indepenndently carrried out diissertation titled IPR
R Issues in
n Cyberspace, underr our
supervission and gu
uidance annd we recom
mmend it for
f submisssion.
Place: Pimpri
P
Date : 16.02.2019
1 9
(I) RREFACE…………………………………………………………………. 7
(II) CONNOTATION…………………………………………………………. 8
(III) DISCRIPTION……………………………………………………………. 9
(IV) NECESSITY AND IMPACT……………………………………………. 13 to 16
(V) INTELLECTUAL PROPERTY ISSUE AREAS…………………….
(A) TRADEMARK
DEFINITION & MEANING……………………………….. 17
(a) TRADEMARK ISSUES IN CYBERPACE
(i) Cyber Squatting…………………………………………. 18
(ii) Tybo Squatting………………………………………….. 20
(iii) Cyber Twins & Parasites…………………………….... 21
(vi) Framing and Linking…………………………………... 22 to 23
(v) Meta Tagging……………………………………………. 24
(vi) Hijacking……………………………………………….. 25
(vii) In-lining………………………………………………… 26
(viii) Deep Linking………………………………………….. 27
PAGE NO
PAGE NO
(i) Misappropriation………………………………………………… 63
P a g e | 7
INTRODUCTION:-
Intellectual Property (IPR) are the legal rights governing the use of
creations of the human minds.Intellectual property refers to creation of mind
,i.e., Inventions, industrial designs for article, literary and artistic work,
symbols, etc., used in commerce.
The term “Intellectual Property “ has been used for almost more than one
hundred and fifty years ,which refers to the general area of the law that includes
copyrights, patents , designs and trademark and the related rights The
Intellectual property law regulates the creation ,use and exploitation of mental
or creative labour . These are number of forms and important differences
between the various forms of intellectual property .The single factor that they
are in common is that they establish property protection over intangible things
such as ideas, inventions , signs and information.
CONNOTTION:-
• INTELLECTUAL PROPERTY IN CYBER SPACE:-
Every new invention in the field technology experiences the variety of threats.
Internet is one such threat , which was captured the physical marketplace and
have converted it into a virtual marketplace.
DESCRIPTION:-
• To protect the intellectual property of the creator, so that no body
can enjoy the Fruits of the other’s efforts.
1. Patent rights to inventors
2. Registration of designs
3. New Logos , marks as Trade Marks
4. Literature can be registered for their legal protection
Copyright
• To achieve the progress of human beings
• Legal protection encourages creativity
• It spurs economic growth-nation’s growth
• Some Intellectual thought need to be restricted.
P a g e | 10
NESSISITY :-
TRADEMARK:-
What is trademark?
Any “word, name, symbol and device, or combination thereof’ that is used:
1. To distinguish and identify goods or services from those
manufactured , sold or offered by other, and
2. To indicate the source of goods and services.
3. Its like symbols(Like logos and Brand names)
P a g e | 18
• Cyber squatting is the use of domain name to make a profit off a trademark
belonging
• To someone else or registering a domain name of famous company or a
celebrity and Then selling it at a inflated price.
Type of Cyber Squatting:-
• Cyber squatting, a.k.a. Domain name squatting
1. When squatter buy a domain name that is usually trademark of
company or the name of specific company.
• Typo squatting, a.k.a. URL Hacking
2. Someone buy a domain name that is similar to another domain
with small , common typo.
P a g e | 19
¾ First Cyber Squatter:‐
• Dennis Toepen , US Citizen
• In 1998, registered over one hundred domain names in various well‐
trademarks.
• Including ( “Panavision.com”, “panaflex.com” )
• Various marks belonging Delta Airlines, Neiman‐ Marcus , Eddie Bauer
and Lufthansa.
• Offered to sell domain to Panavision FOR $13000
P a g e | 20
(ii) TYBO SQUATTING:-
• When a cyber squatter registers domain name containing variant of
popular trademarks .Typo squatters rely on the fact that Internet users will
make typographical errors when Entering domain names into their web
browsers.
• When both the domain name holder and the challenger have a legitimate
claim to a domain name then they are knows as cyber twins.
• The cases involving cyber twins are the most difficult once, because , but
for the domain name dispute, the law of trademark and unfair competition
might otherwise allow each party to enjoy concurrent use of the name.
(iv) FRAMING:‐
• “Framing” is the process of allowing a user to view the contents of one
websites while it is framed by information from another sites , similar to
the “picture-in-picture” feature offered on some televisions.
• Framing may trigger a dispute under trademark law theories , because of
framed site arguably alter the appearance of the content and creates the
impressions that it’s owner endorses or voluntarily chooses to associate
with the framer
P a g e | 23
(vi) LINKING:-
• HYPERTEXT REFERENCE LINK:
Hypertext reference link instantly transports the user to
another location. The may link simply to a particular point within the same
website, or allow the user a leap from one site to completely different ,
unrelated site provided by a different source. This from of linking , called
“Linking out”.
• IMAGE LINKING:
Image links brings an image contained in a separate file
may be an image file stored on a same server as the link or an image file
stored on a separate, unrelated site, which is know as “Linking In”,
For. Eg. A Travel Agency and
Hotel Website.
P a g e | 24
P a g e | 25
(VI) HIJACKING:-
P a g e | 26
(VII)IN-LINING:-
• In-lining or In- line lining enables a web page to summon different
elements from diverse pages or servers to create a new Web page.
• Instead of copying new elements to composite page , the elements are
linked in by” pulling in” graphic or image file from another site and
displaying on composite web page.
• While browsing the composite page, the page directs the browser to
get the picture , graphics etc. from the original sources.
• Website A Imports Graphic file (using IMG links) from website B.
• The user remains at website A and can view content from website A
and the graphic files.
P a g e | 27
(VIII)DEEP LINNKIG:-
• Deep linking allows visitors to by pass information and advertisement at the
home page and go directly to an internal page. There is no law or court
ruling prohibiting Deep Linking.
• Deep linking direct visitors past a home page and directly to an internal
webpage.
• Some Deep links incorporate trademark
• Some include disclaimers: This Link will take you directly to another
company’s websites.
• No law prohibiting Deep linking, but actions brought for:
Unfair Competition
Deceptive Practices
Trademark Infringement
False Advertising
• Example: Appliance manufacturer links directly to internal page of non –
profit consumer reviewing agency.
P a g e | 28
COPYRIGHT:‐
WHAT IS COPYRIGHT?
• “Copyright” is a protection that covers published d and unpublished literary
,scientific and artistic works, whatever the form of expression, provided such
works are fixed in a tangible or material form.
• This means that if you can see it, hear it, and / or touch it---it is protected.
WHAT IS COPYRIGHTED?
• Musical Score
• Dance & Animation
• Books , Magazines
• Poetry
• Web Page
• Photographs & Visual Images
• Computer Programs ( Multimedia etc.)
• Videos & Audio (Your Own Voice)
• Sound Recording
COPYRIGHT IN INTERNET?
• Everything on the Internet is Copyrighted
¾ World Wide Web Pages
¾ Courses
¾ Electronic Mail and Newsgroup
¾ Computer Database
¾ Computer software
¾ Computer Layouts design
¾ Various works on web etc.
• The same copyright laws apply to electronic materials as to print material
P a g e | 30
COPYRIGHT ISSUES IN CYBERSPACE:-
Some Example of Software;-
P a g e | 32
• In India , the copyright for software lasts for the life of the author,
plus sixty years, after the expiry of such period the work comes into
public domain. In Case of Pseudonymous or anonymous work and
work by public undertaking , the copyright lasts for sixty years from
the date of publication.
literal limitation of prior work with minor changes here and there,will
constitute violation of copyright law.Copyright law protects not only
literal copying of the source code but copying the non-literal elements
in a software like the “structure , sequence and organisation”.
for suit for infringement. Both civil and criminal remedies are
available under the Copyright Act.
• A person can claim damages, injuctions, accounts of profits and other
remedies conferred under the law for Copyright in a work shall be
punishable with minimum imprisonment of six months and may
extend to two lakh rupees.The Act also provides for enhanced
punishment in case of second or subsequent offence of copyright
infringement.
• The Indian judiciary is recently being very proactive and strict about
cyber piracy. Recently, the Delhi High Court has granted John Doe
orders, or injunction order against prospective unknown offenders to
prevent copyright violations of movies like Speedy Singhs ,Singham ,
DON 2 and Bodyguard before its release. The John Doe order resulted
in blocking of various file sharing websites like Megaupload,
Filesonic by Internet Access Providers(IAPs). The Calcutta High
Court granted an order to the Internet Service Providers to block
various websites offering pirated music. Software owners may seek
for John Doe orders to prevent software piracy throught internet in a
similar fashion.
• In INDIA, the Intellectual Property Rights (IPR) of Computer
software is covered under the Copyright Law.
• Accordingly, the Copyright of Computer Software is protected under
the Provisions of Indian Copyright Act ,1957.
• Computer software is protected as Literary Work.
P a g e | 35
(iii)Websites:-
(v) Archivi
A ing:-
• In Archiving,
A the proceess entails downloadding and storing off the
materrial of anoother websiite and inccorporatingg the samee. Even if there
t
does exist a hyyperlink , the
t link shall take the user to another
a areea of
the same
s site where thee material of anothher site haas been sttored
Archhiving withhout the perrmission of
o the copyyright owneer may am mount
to inffringementt.
• Thumbbnails:-
• Shareware:
This is also known as “try before you buy” software.This
software usually come with functionality for a limited period. After
this trial period users must either buy the software or uninstall it
from their computers.The trial period could be in terms of number
of days.
• Demo ware:
Copyright Issues Involving Music:
A piece of recorded music is covered by two copyrights. The copyright in the
composition protects the music and lyrics. If any, and is usully owned by the
songwriter . The producer or record company owns a separate copyright in the
sound recording, which protects the audio engineering and production of the
recording. These copyrights provide their owners with the exclusive right to make
copies of the music and distribute it to others, perform the music and create
derivative works.
(viii) File –Sharing:‐
• Distributing music to others using internet file-sharing services infringes
both sound recording and musical composition copyrights. Whether the file-
sharer gets any direct or indirect commercial gain from these activities is
irrelevant. If the copyright holders bring infringement lawsuits, that they
may be entitled to thousands of dollars in damages and fees. Federal law
also imposes criminal penalties for those found guilty of unauthorized
reproduction and distribution of sound recordings.
• Prolific file-sharers may be found guilty of a felony sentenced to a
maximum of five years in prison and $250,000 in fines.
P a g e | 41
¾ Sampling:‐
• A producer samples by lifting a few notes from a pre-existing sound
recording and incorporating those notes into his new recording. Sampling
without permission infringes the sound recording copyright and may also
infringe the copyright in the composition. A license is required because
sampling violates the copyright holders exclusive rights to make copies of
her work and distribute it to others.
• If a large amount of music id sampled from the prior recording, the new
song could also be considered a derivative work. License rates are not ;
P a g e | 43
P a g e | 44
PATENT:-
P a g e | 45
P a g e | 46
Conditions of Patentability:
Patent Issues In Cyberspace:-
• Internet is Software driven .Software enables the networking of
computers and the actual transmission of data . Controversy as to
whether computer software should be protected under copyright law
or patent law is not yet resolved and still remains as an exclusive
concept for intellectual property.
• Patents re granted to invention which are new , novel and useful.
Traditionally , patent have been associated with more industrial or
scientific innovations, such as machinery, manufacturing process,
computer chips and pharmaceuticals. A patent laws available to
protect it.
• Two Important Issues concerned with patent and have created
controversy over the cyberspace :-
(Eaxm.Amazon.com)
exam.
1. Apple IOS
2. Google Android
3. Playstore etc.
4. Facebook
5. Microsoft
6. Instagram
P a g e | 48
Business Patent Method :-
• In Amazon.com V Barnesandnoble:-
¾ Amazon.com filed a patent application with
USPTO(United States Patent and Trademark
Office) for a business method: “Method and
system for placing a purchase order via a
communication network”.
¾ In this Patent Application, Amazon.com claimed
as its invention a business methodology for
placing an order ,whereby in response to only a
single action performed by a consumer (such as
click of mouse), a requested item may be ordered.
Additional information necessary to complete the
order, such as credit card number and shipping
address ,is obtained from information previous
received from the consumer and stored in a
database by the vendor, This patent was dubbed
as “I-CLICK” patent because users of the
invention need click only once with the mouse on
a hyperlink to complete the purchase of an item,
P a g e | 49
Software Patent:-
• Apple sued phone maker HTC and filed a complaint with the U.S
International Trade Commission. Alleging that the Taiwanese
company is infringing 20 Apple patents related to the iPhone.
• Steve Jobs, Apple’s CEO, said in a statement “We think competition
is healthy, but competitors should create their original technology,
not steal ours.
P a g e | 51
P a g e | 52
• Cyber bullying is bullying that takes place over digital devices like
Cell Phones , computers, and tablets. Cyberbullying can occur
through SMS , TEXT and APPS, or online in social sites forums, or
gaming where people can view, participate in , or share content
.Cyberbullying includes sending, posting or sharing negative
harmful, false or mean content about someone else. It can include
sharing personal or private information about someone else causing
embarrassment or humiliation. Some cyberbullying crosses the line
into unlawful or criminal behaviour.
P a g e | 54
TRADE SECRET:-
What is a Trade Secret?
• A trade secret is a formula , pattern , physical device , idea , process , or
complication of information which is not generally known or reasonably
ascertainable, by which a business can obtain an electronic advantage over
competitors or customers.
• Trade secret are aspects of your company that, if discovered by a competitor
, could significantly impact your bottom line or your ability to complete in
marketplace.
• In some Jurisdictions , such secrets are referred to as “Confidential
Information” or “Classified Information”.
• Reasonable efforts are used to keep it Secret.
P a g e | 56
Trade Secret:
a. Information
b. A formula
c. Pattern
d. Compilation
e. Program
f. Device
g. Method
h. Technique
i. Or Process
How to
t Protect Trade
T Secrret:-
2.Google Search
P a g e | 59
3.WD-40 Formula
4. The Big Mac Special Sauce
P a g e | 60
• The Secret Recipe of “11 herbs and spices” lies in a bank vault.
Few People Know it, and they are contractually obligated to
secrecy.
• The Ingredients are mixed by two different companies in two
different locations and then combined elsewhere in a third and
separate location.
• To Mix the final formula , a computer processing system is used to
blend the mixtures together and ensure that no one outside KFC has
the complete recipe.
¾ Procter and Gamble Co unit Gillette filed lawsuit against four former
employees for disclosing trade secrets to shaveLogic Inc, their current
employer.
¾ Breached their contracts with Gillette by disclosing highly confidential
information and trade secrets.
P a g e | 61
¾ Gillette , which is more than a century old, said in the filing that monetary
compensation would be determined at the trial.
P a g e | 62
(i)Misappropriation
(iii)Cyber Espionage
P a g e | 63
(i) Misappropriation:-
Acquisition, disclosure or use of trade secret of another by a
person who knows or has reason to know that the trade secret was acquired
by improper means;
• However , this can come into consideration indirectly when one has
acquired systems that were used to access a protected service, where a
trade secret services does not concern trade secrets as a such but
• providing tools and system where they then could access the secret
information.
• From this it can be seen, that solely the computer break-in may
directly concern trade secret, but it should be kept in mind ,that of
misuse of business secret requires predicate offence committed. This
means that other cybercrime could be considered as such predicate
offence and be indirectly part of a trade secret misappropriation.
(A) Yahoo! Inc. V Akash Arora&Anr[1999 (19) PTC201(DEL)]
• A domain name registrant does not obtain any legal right to use
that particular domain name simply because he has registered the
domain name, he could still be liable for Trademark
Infringement.
P a g e | 69
• It was held by the Court that the intention to use the trade mark
besides direct or indirect use of the trademark was sufficient to
give jurisdiction to the court to decide on the issue.The court
finally granted an interim injunction against the
defendants(Bisleri) form using the trade mark MAAZA in india
as well as for export market, which was held to be infringement
of trade mark.
P a g e | 70
Kala Vijayaraghavan&Lijee Philip , ET Bureau Mar 16
,2009 , 09.41 AM IST
• MUMBAI: Tata motors has applied for patent protection for
over 37 inventions and innovation linked to its high-profile
Affordable car, Nano, in an aggressive move to protect the
brand against limitation in the ultra-competitive car industry .It
is also close to filing intellectual property rights (IPRs) claims
for Nano in overseas market ,Company officials said.
P a g e | 72
Closure :‐
As Intellectual Property is one of the valuable assets of any person.
From the foregoing studies it can be concluded that the advent of the
cyberspace means a internet is serious concern in the field that of
Intellectual Property rights. The infringement of IP right over internet
is common now a day. So there is a need a specific provision which
regulate IP Issues in cyberspace It should be protected at any cost since
a person put his skills and labour for creation of Intellectual Property.
On the other hand there is an urgent need for the strict laws in this field,
so that these crimes related To IPR could be avoided in future. The new
domain name dispute law should be intended to give trademark and
service mark. Owners legal remedies against defendants who obtain
domain names” in bad faith” that are identical or confusingly similar to
a trademark .It should act as an important weapon for trademark
holders in protecting their intellectual property in the online world .In
US They have special legislation for prevention of cybersquatting .so
it’s a high time for india to enact such a suitable legislation which will
protect the rights of Copyright , Trademark , Patent and Trade Secret
Various issues involving cyberspace against Intellectual Property.
Legal , economic and public policy research should be undertaken to
determine the extent to which intellectual property rights have to be
protected in cyberspace. Internet being a borderless medium is
responsible for the ‘death of distance’ among nations which has created
international problems, international conventions and treaties seem to
be more appropriate to protect and promote the interest of the
cyberspace entities.
P a g e | 73
BIBLIOGRAPHY:‐
BOOKS AUTHORS
P a g e | 74
WEBLIOGRPHY:‐
• www.wipo.int
• www.indiankanoon.org
• www.org/wiki.copyright.com
• www.makeinindia.com/intellectual property
facts
• www.ipindia.nic.in
• http://WWW.Cybergaurds.com
• www.en.wikipedia .org
• www.oznetlaw.net/fact/database
• www.cyberlawindia.com/
• www.cyberlawdb.com
• www.cyberlaws.net
• google.go.in
• study.com
• ask.reference.com
• www.linfo.org/database.html
• In.norton.com
• Serchcybersecurity.com
• Informationweek.com
• www.law.emory.edu
• www.bitlaw.com