Module 7: Key IP Issues Flashcards
To steal and pass off (the ideas or words of another) as one’s own, to use (another production) without crediting the source, to commit literary theft or to present as new and original an idea or product derived from an existing source.
Plagiarism
Supreme Court Resolution on Plagiarism
There is no commonly-used dictionary that embraces in the meaning of plagiarism errors in attribution by mere accident or in good faith.
Plagiarism is identified not through intent but through the act itself.
The process of taking something apart in order to understand it, build a copy of it, or improve it.
Originally applied to computer hardware but is now commonly applied to software.
Reverse Engineering
A type of reverse engineering that involves analyzing it to create a new representation of the system in a different form or at a higher level of abstraction.
Software Reverse Engineering
Reverse engineering software usually begins by doing what?
Extracting design-stage details from program code, which are more conceptual and less defined than the program code.
The process that takes the design of an existing software and produce code in a new database programming language using code-generation tools.
Forward Engineering.
Issues on Reverse Engineering
Reverse engineering on a purchased software application developed and licensed by outside parties.
Use of Decompilers and other reverse-engineering techniques to reveal a competitor’s program code, which can then be used to develop a new program that either duplicates the original or interfaces with the program.
Any program whose source code is made available for use or modification, as users or other developers see fit.
The basic premise behind this is that when many programmers can read, redistribute, and modify a program’s code, the software improves
Open source code
Two frequently cited reasons for using open source software
It provides a better solution to a specific business problem
It costs less
How can a software developer attempt to make a program open source?
By putting a program into the public domain with no copyright.
Legally obtained information that is gathered to help a company gain an advantage over its rivals
Requires the continual gathering, analysis, and evaluation of data with controlled dissemination of useful information to decision makers
Competitive intelligence
The use of illegal means to obtain business information not available to the general public.
Industrial espionage
Almost all the data needed for competitive intelligence can be collected from what?
Examining published information
Analytical tools and industry expertise
The unauthorized use in commerce of a registered trademark or a copy or colorable imitation thereof, which results in the likelihood of confusion among the consuming public.
Trademark infringement
The elements of trademark infringement
1.) A registered trademark in the Philippines
2.) Plaintiff’s ownership of said mark
3.) Use of the trademark or imitation thereof by a third person, which results in likelihood of confusion.