Software Security 415 725 FC Lecture 2 Software
![Software Security 415. 725 FC Lecture 2: Software Law Clark Thomborson University of Auckland Software Security 415. 725 FC Lecture 2: Software Law Clark Thomborson University of Auckland](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-1.jpg)
![“The Age of Software Patents” Kenneth Nichols IEEE Computer, April 1999 “As a computer “The Age of Software Patents” Kenneth Nichols IEEE Computer, April 1999 “As a computer](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-2.jpg)
![Outline • Tutorials – Essentials of US patent law, for software – US trade Outline • Tutorials – Essentials of US patent law, for software – US trade](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-3.jpg)
![What is a Patent? “A patent is a legal monopoly granted for the use, What is a Patent? “A patent is a legal monopoly granted for the use,](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-4.jpg)
![What is an Invention? • An invention is a device or process that is What is an Invention? • An invention is a device or process that is](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-5.jpg)
![The Process of Patenting 1. You invent something. 2. You apply for a US The Process of Patenting 1. You invent something. 2. You apply for a US](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-6.jpg)
![What Can You Do with a Patent? • You may “assign” your patent to What Can You Do with a Patent? • You may “assign” your patent to](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-7.jpg)
![Trade Secrets for Software 1. You write some clever software. 2. You don’t reveal Trade Secrets for Software 1. You write some clever software. 2. You don’t reveal](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-8.jpg)
![Software Copyright 1. 2. 3. 4. You write some software. You obtain copyright protection Software Copyright 1. 2. 3. 4. You write some software. You obtain copyright protection](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-9.jpg)
![Conclusion • All software developers should know at least a little bit about patents, Conclusion • All software developers should know at least a little bit about patents,](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-10.jpg)
![For More Information… • A more careful treatment of the legal issues in patenting For More Information… • A more careful treatment of the legal issues in patenting](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-11.jpg)
![“Encoding the Law into Digital Libraries” Pamela Samuelson Comm. ACM, April 1998 “One of “Encoding the Law into Digital Libraries” Pamela Samuelson Comm. ACM, April 1998 “One of](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-12.jpg)
![Outline • How copyright constrains digital libraries – A copyright owner may restrict copying, Outline • How copyright constrains digital libraries – A copyright owner may restrict copying,](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-13.jpg)
![Restrictions on Copying • If a digital library has a license or contract saying Restrictions on Copying • If a digital library has a license or contract saying](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-14.jpg)
![A Murky Question If a copyright is about to expire, can the copyright owner A Murky Question If a copyright is about to expire, can the copyright owner](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-15.jpg)
![Another Murky Question Can a copyright holder insist that a digital library add software Another Murky Question Can a copyright holder insist that a digital library add software](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-16.jpg)
![Conclusion • This article poses some intriguing questions in public policy, regarding how copyright Conclusion • This article poses some intriguing questions in public policy, regarding how copyright](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-17.jpg)
![For More Information… • Soon after Samuelson wrote her article, the US Congress passed For More Information… • Soon after Samuelson wrote her article, the US Congress passed](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-18.jpg)
![Readings for Next Week • Tuesday: – Bibliography for Comp. Sci 725, select a Readings for Next Week • Tuesday: – Bibliography for Comp. Sci 725, select a](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-19.jpg)
- Slides: 19
![Software Security 415 725 FC Lecture 2 Software Law Clark Thomborson University of Auckland Software Security 415. 725 FC Lecture 2: Software Law Clark Thomborson University of Auckland](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-1.jpg)
Software Security 415. 725 FC Lecture 2: Software Law Clark Thomborson University of Auckland 12/12/2021 SW law 1
![The Age of Software Patents Kenneth Nichols IEEE Computer April 1999 As a computer “The Age of Software Patents” Kenneth Nichols IEEE Computer, April 1999 “As a computer](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-2.jpg)
“The Age of Software Patents” Kenneth Nichols IEEE Computer, April 1999 “As a computer professional, it is highly unlikely that you have ever read a patent… however… patents will play a pivotal role in future software products and research. ” 12/12/2021 SW law 2
![Outline Tutorials Essentials of US patent law for software US trade Outline • Tutorials – Essentials of US patent law, for software – US trade](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-3.jpg)
Outline • Tutorials – Essentials of US patent law, for software – US trade secrets and copyright, for software • Editorials – Why software is different from all other inventions – Why software patents don’t work – Software patents may be harmful Public good of encouraging invention, versus the harm of restricting use “… but software patents are neither inherently good nor bad. ” 12/12/2021 SW law 3
![What is a Patent A patent is a legal monopoly granted for the use What is a Patent? “A patent is a legal monopoly granted for the use,](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-4.jpg)
What is a Patent? “A patent is a legal monopoly granted for the use, manufacture and sale of an invention. ” It is valid for twenty years. Legal monopoly = your right to be “in control” of your invention, will be defended by the US government. This is a form of “intellectual property. ” 12/12/2021 SW law 4
![What is an Invention An invention is a device or process that is What is an Invention? • An invention is a device or process that is](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-5.jpg)
What is an Invention? • An invention is a device or process that is new, useful, and non-obvious. • What is not an invention? – Anything that is neither a device nor a process. (Is software a device? A process? ) – Anything that has been “disclosed” previously, including all patent applications filed earlier than yours. – Anything that is not in “the useful arts” including literary, decorative, or entertaining innovations: “A technique for constructing novels would not qualify for a patent. ” (!) 12/12/2021 SW law 5
![The Process of Patenting 1 You invent something 2 You apply for a US The Process of Patenting 1. You invent something. 2. You apply for a US](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-6.jpg)
The Process of Patenting 1. You invent something. 2. You apply for a US patent prior to disclosure, or for a NZ patent within 12 months of first disclosure. 3. A patent examiner reviews your application, to decide if your description is sufficiently “enabling” to be a disclosure of an invention that is both novel and useful. 4. You answer any objections or questions the examiner may raise, possibly revising your “claims” that will define the coverage of your patent. 5. Your patent is “issued” (or it may be denied ; -). 12/12/2021 SW law 6
![What Can You Do with a Patent You may assign your patent to What Can You Do with a Patent? • You may “assign” your patent to](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-7.jpg)
What Can You Do with a Patent? • You may “assign” your patent to someone who will pay the (substantial) costs of filing and defending it. • You may sell licenses to your patent, allowing others to manufacture something containing your invention. • If you discover someone “infringing” your patent, you may offer to sell them a license, and you may refuse to let them use your patent. FWhy is your right of refusal in the public interest? 12/12/2021 SW law 7
![Trade Secrets for Software 1 You write some clever software 2 You dont reveal Trade Secrets for Software 1. You write some clever software. 2. You don’t reveal](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-8.jpg)
Trade Secrets for Software 1. You write some clever software. 2. You don’t reveal your “secret” cleverness, except to people who have signed a “nondisclosure agreement” (NDA). 3. You can prosecute anyone who reveals your secret, if they have signed an NDA. 4. You have limited protection over people who “reverse engineer” your software to discover your clever idea. 12/12/2021 SW law 8
![Software Copyright 1 2 3 4 You write some software You obtain copyright protection Software Copyright 1. 2. 3. 4. You write some software. You obtain copyright protection](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-9.jpg)
Software Copyright 1. 2. 3. 4. You write some software. You obtain copyright protection (easy!). You can prosecute (almost) anyone who copies your software. Everyone has the right to make a “derivative work” by changing some visual or auditory elements. 5. The “look and feel” of the GUI for the Microsoft and Macintosh OS are protected by US copyright law. 6. Text-only interfaces (DOS, Unix) are not protected. 7. Crown Copyright differs from US Copyright, but there are international agreements. 12/12/2021 SW law 9
![Conclusion All software developers should know at least a little bit about patents Conclusion • All software developers should know at least a little bit about patents,](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-10.jpg)
Conclusion • All software developers should know at least a little bit about patents, copyrights and trade secrets. This article is an excellent introduction. 12/12/2021 SW law 10
![For More Information A more careful treatment of the legal issues in patenting For More Information… • A more careful treatment of the legal issues in patenting](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-11.jpg)
For More Information… • A more careful treatment of the legal issues in patenting can be found in “Patent Law Basics, ” Office of Technology Transfer, University of Arizona, 14 December 1998. Available: http: //vpr 2. admin. arizona. edu/ott/Guidebook/patbasic. htm, February 2001. • My published international patent applications, and all other US patents and WIPO applications, can be viewed at http: //www. delphion. com/. 12/12/2021 SW law 11
![Encoding the Law into Digital Libraries Pamela Samuelson Comm ACM April 1998 One of “Encoding the Law into Digital Libraries” Pamela Samuelson Comm. ACM, April 1998 “One of](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-12.jpg)
“Encoding the Law into Digital Libraries” Pamela Samuelson Comm. ACM, April 1998 “One of the burning questions in the field of cyberlaw is to what extent law or public policy should intervene to tell technologists what they can and can’t code. ” 12/12/2021 SW law 12
![Outline How copyright constrains digital libraries A copyright owner may restrict copying Outline • How copyright constrains digital libraries – A copyright owner may restrict copying,](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-13.jpg)
Outline • How copyright constrains digital libraries – A copyright owner may restrict copying, within limits. – Libraries have a right to permit copying, within limits. – Technologists tend to oversimplify copyright limits, which are complicated for good reason. • Privacy considerations (records of “who borrowed what”) • “Code as code” = software can be like a legal system – Hacking = civil disobedience? – Laws may be passed (in the US and elsewhere) to circumvent anti-copying code. Do you care? 12/12/2021 SW law 13
![Restrictions on Copying If a digital library has a license or contract saying Restrictions on Copying • If a digital library has a license or contract saying](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-14.jpg)
Restrictions on Copying • If a digital library has a license or contract saying “no more than three users can access a document at one time” then – you, as the software developer for the library, should enforce this restriction by limiting concurrent access. – If your code allows six concurrent accesses, then your library would be in violation of both contract law and copyright law (because authors have the right to control access). 12/12/2021 SW law 14
![A Murky Question If a copyright is about to expire can the copyright owner A Murky Question If a copyright is about to expire, can the copyright owner](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-15.jpg)
A Murky Question If a copyright is about to expire, can the copyright owner insist that the document be “destroyed” after expiration? – Yes, if the library agrees to sign the contract. – No, such contracts are unenforceable because the “public good” served by a copyright (of a limited-term monopoly to control access) would be subverted. Note: the term is 75 years or more. – Which legal theory will apply in the US? Elsewhere? 12/12/2021 SW law 15
![Another Murky Question Can a copyright holder insist that a digital library add software Another Murky Question Can a copyright holder insist that a digital library add software](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-16.jpg)
Another Murky Question Can a copyright holder insist that a digital library add software security, to severely limit unauthorised readings and “private performances”? – Yes, this is a reasonable restriction, otherwise a single copy at an online library will make it very difficult for an author to sell any more copies of their work. – No, private performances and “fair use” copying (e. g. for education and research, within limits) is expressly allowed by US copyright law. – Which legal theory will apply in the US? Elsewhere? 12/12/2021 SW law 16
![Conclusion This article poses some intriguing questions in public policy regarding how copyright Conclusion • This article poses some intriguing questions in public policy, regarding how copyright](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-17.jpg)
Conclusion • This article poses some intriguing questions in public policy, regarding how copyright does (and “should”) affect digital libraries. • I would strongly recommend it to any computer science major who shows any interest in digital libraries, computer law, or public policy. 12/12/2021 SW law 17
![For More Information Soon after Samuelson wrote her article the US Congress passed For More Information… • Soon after Samuelson wrote her article, the US Congress passed](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-18.jpg)
For More Information… • Soon after Samuelson wrote her article, the US Congress passed the 1998 Digital Millennium Copyright Act (DMCA). • From IEEE Computer, Jan 2001, p. 30: – The DMCA made “it unlawful [in the USA] to circumvent technologies protecting access to copyrighted digital works such as software and music. ” – The US Copyright Office recently “decided to permit users to bypass intellectual-property protection software only to determine which Web sites are blocked by filtering software and to work with materials protected by malfunctioning or obsolete access-control mechanisms. ” – No other exemptions were granted. • I foresee some interesting litigations! – Is copyright-protection software malfunctioning or obsolete, if it doesn’t allow “fair use”? – Will any “reverse engineering” defense be successful? 12/12/2021 SW law 18
![Readings for Next Week Tuesday Bibliography for Comp Sci 725 select a Readings for Next Week • Tuesday: – Bibliography for Comp. Sci 725, select a](https://slidetodoc.com/presentation_image_h2/02a9953f238a01490fe4b8f939414fce/image-19.jpg)
Readings for Next Week • Tuesday: – Bibliography for Comp. Sci 725, select a paper for your oral report! • Wednesday: – Ethical statements from IEEE, CPSR, and RSNZ. – Pfleeger, "Ethical issues in computer security, " section 11. 5 of Security in Computing, 2 nd edition, Prentice Hall, 1997. – C. Mann, "Who will own your next good idea? ", The Atlantic Monthly, 57 -82, September 1998. – H. Rosner, "Steal this software, " The. Standard. com, June 19, 2000. – P. Radatti, "Cybersoft, Incorporated Moral Guidelines, " Cybersoft, Inc, 1996. • Friday: – C. Collberg and C. Thomborson, "Watermarking, Tamperproofing, and Obfuscation - Tools for Software Protection, " Computer Science Department Technical Report 170, University of Auckland, February 2000, 15 pp. 12/12/2021 SW law 19
940 en yakın onluğa yuvarlama
1,151,725 bytes
Private securit
415 group
Naca 2413
Ncgs 14 415
Participation constraints in dbms
Entity 415
(877)415-1745
Ppc-415
Friends sig
Aryabath
Cpsc 415
01:640:244 lecture notes - lecture 15: plat, idah, farad
Software security touchpoints
Computer security 161 cryptocurrency lecture
Osi security architecture in network security
Guide to network security
Wireless security in cryptography
Visa international security model in information security