1140
-
Upload
samuel-yip -
Category
Documents
-
view
4 -
download
0
description
Transcript of 1140
-
5/26/2018 1140
1/5
1
NATIONAL UNIVERSITY OF SINGAPORE
NUS BUSINESS SCHOOL
DEPARTMENT OF STRATEGY AND POLICY
GEK 1042 INTELLECTUAL PROPERTY ISSUES IN CYBERSPACE
Lecturer : Associate Professor Susanna H.S. Leong (Course Coordinator)
Session : Special Term II, 2012/2013
Course Objectives
Over the past two decades, the subject of Intellectual Property has grown significantly,
both in terms of importance and scope. Intellectual property is increasingly seen to bethe new foundation for creating wealth, especially in a knowledge-based economy. The
ability to harness and protect intellectual property is of paramount importance in the
competitive market place.
With advances in computer technology and the advent of internet, intellectual propertyis no longer only confined to the brick-and-mortar world but is also found in the world
of cyberspace.
The primary objective of this module is to equip students with a general understandingof the subject of intellectual property rights and its significance as a tool for wealth
creation. Next, the students are presented with various issues related to intellectual
property that have arisen largely as a result of the growing use of the internet as a toolfor publication and distribution of information. These issues which span across areas
like the law, business and public polices are both interesting to study and explore. With
the view of further broadening the students perspective in this subject matter,comparisons are made between the positions in Singapore and those elsewhere in the
world.
Course Outline
Lesson 1
Introduction
What is Intellectual Property? Tangible property vs. intangible property Brick-and-mortar world vs. virtual world What kind of intellectual property rights are generated in the physical world? What is the difference if these intellectual property rights are generated in
cyberspace?
Lesson 2
Confidential Information
What is confidential information? Why is confidential information important or valuable? How can confidential information be protected in law? What are the implications or consequences if one fails to protect confidential
-
5/26/2018 1140
2/5
2
information?
Confidential information used in cyberspace Confidential information and the issues of privacy in the virtual world Confidential information and the emerging right of publicity with regard to the
protection of famous personal images and other indicia
Lesson 3
Patents and Inventions
What is a patent? What does a patent protect? Why should an inventor apply for a grant of patents for his inventions and
innovations?
How to apply for a patent? What are the criteria for grant of a patent? What are the exclusive rights conferred upon a patent owner by the law? What remedies are available for a patent owner whose patent has been infringed? The global market place and the significant of patents
Lesson 4Copyright
What subject matters are protected by copyright? When does copyright subsist in a work? What are the exclusive rights of a copyright owner? How is copyright protection important and relevant to authors? When is copyright infringed? What are the consequences of infringement? What remedies are available to a copyright owner whose copyright in a work hasbeen infringed? The global market and copyright protection
Lesson 5
Trade Marks and Passing Off
What are trade marks? How important are trade marks to businesses? What is the rationale for protecting trade marks? Registrability of trade marks What are the exclusive rights of a registered trade mark owner Infringement of registered trade marks What remedies are available to a registered trade mark owner whose trade mark
has been infringed?
Trade marks which are not registered can they be used? How to protect trade marks which are not registered?
-
5/26/2018 1140
3/5
3
Lesson 6
Data Protection and Privacy Issues in Cyberspace
Data protection laws Hacking and computer misuse Laws Privacy Issues and the protection of the law
Lesson 7
Patents & Computer-Related Inventions
Can computer programs be patented? Can business methods be patented? Should they be protected?
Lesson 8Computer Programs and Copyright
Are computer programs protected by copyright? The protection of designs of circuits and semi-conductor products Multimedia works and copyright protection in cyberspace Copyright infringement in cyberspace
Lesson 9
Databases and Factual Compilations
Databases and subsistence of copyright The creative originality vs. The sweat of the brow or labour investment Comparative analysis across jurisdictions: USA, UK, Canada, Australia and
Singapore
The proprietary models: The European Directive on the legal protection ofdatabases; The proposed WIPO Treaty 1996; The proposed database investment
and Intellectual Property Antipiracy Act of 1996
The alternative legal model: unfair competition/ misappropriation theoriesLesson 10
Digital rights management information P2P file sharing and copyright piracy issues Criminalizing of copyright infringement in cyberspace The Right of communication to the public Rights and liabilities of internet service providers
Lesson 11
Trade Marks in Cyberspace What are domain names? What is the significance of domain names as an indicator of origin? What is cybersquatting? Resolution of Domain Names Disputes Issues on infringement and other unfair usage of trade marks over the Internet
Lesson 12
-
5/26/2018 1140
4/5
4
The access challenge in the 21stcentury: emerging issues in intellectual property laws and
knowledge governance
Revision
Modes of Teaching and Learning
This module adopts a seminar style teaching. As the module is conducted over theSpecial Term, we meet two to three times in a week, each time for a period of 3 contact
hours for a total of 6 weeks. The first 1 hour and 30 minutes of the seminar is typically
spent on imparting the basic principles on the subject matter to the students. However, the
students must be prepared to interact with the instructor during this session and thus, theymust have read the relevant reading materials before the seminar.
The rest of the seminar time is devoted to case analysis and discussions to be preparedand presented by the students. These case analysis and discussions are the heart of the
module as it is through careful dissection and systematic presentation of arguments of the
issues found in these cases that the students truly learn to appreciate the significance of
the issues and to critically evaluate their implications.
Reading List
1. Suggested Readings
Reference Books:1. Computer Law, Fourth Edition, Edited by Chris Reed & John Angel;2. Introduction to Computer Law, Fourth Edition, David Bainbridge;3. The International Intellectual Property System: Commentary and Materials,
Abbott, Cottier & Gurry
Singapore Statutes:1. The Copyright Act 19872. The Patents Act 19943. The Trade Marks Act 19944. The Registered Designs Act 2000
Cases:
Selected Judicial Decisions.- These judicial decisions will form the pool of case analysis and discussions. They
are selected from a number of jurisdictions such as Singapore, the United
Kingdom, the United States, Australia and New Zealand.Students in the module are expected to read broadly and a list of relevant materials
including journal articles will be made available to them in the beginning of term.
Mode of Assessment
1. Nature of CA and Final assessment
This is an open book examination module.
-
5/26/2018 1140
5/5
5
CA consists of 2 Quizzes; Group Assignments and presentations; and class participation.
The Final Examination consists of 1 compulsory question. The question takes the form of
case analysis that requires the students to explore a myriad of issues and to formulate
cogent arguments in relation to them.
2. Break up of CA and Final assessment
Quiz 20% (individual effort)
Group Assignments and oral presentations 20% (group effort)Class participation 20% (individual effort)
Final examinations 40% (individual effort)
Prepared by:
Susanna H.S. Leong
Associate ProfessorDepartment of Strategy and Policy
Special Term II, 2012/2013