1140

download 1140

of 5

description

nil

Transcript of 1140

  • 5/26/2018 1140

    1/5

    1

    NATIONAL UNIVERSITY OF SINGAPORE

    NUS BUSINESS SCHOOL

    DEPARTMENT OF STRATEGY AND POLICY

    GEK 1042 INTELLECTUAL PROPERTY ISSUES IN CYBERSPACE

    Lecturer : Associate Professor Susanna H.S. Leong (Course Coordinator)

    Session : Special Term II, 2012/2013

    Course Objectives

    Over the past two decades, the subject of Intellectual Property has grown significantly,

    both in terms of importance and scope. Intellectual property is increasingly seen to bethe new foundation for creating wealth, especially in a knowledge-based economy. The

    ability to harness and protect intellectual property is of paramount importance in the

    competitive market place.

    With advances in computer technology and the advent of internet, intellectual propertyis no longer only confined to the brick-and-mortar world but is also found in the world

    of cyberspace.

    The primary objective of this module is to equip students with a general understandingof the subject of intellectual property rights and its significance as a tool for wealth

    creation. Next, the students are presented with various issues related to intellectual

    property that have arisen largely as a result of the growing use of the internet as a toolfor publication and distribution of information. These issues which span across areas

    like the law, business and public polices are both interesting to study and explore. With

    the view of further broadening the students perspective in this subject matter,comparisons are made between the positions in Singapore and those elsewhere in the

    world.

    Course Outline

    Lesson 1

    Introduction

    What is Intellectual Property? Tangible property vs. intangible property Brick-and-mortar world vs. virtual world What kind of intellectual property rights are generated in the physical world? What is the difference if these intellectual property rights are generated in

    cyberspace?

    Lesson 2

    Confidential Information

    What is confidential information? Why is confidential information important or valuable? How can confidential information be protected in law? What are the implications or consequences if one fails to protect confidential

  • 5/26/2018 1140

    2/5

    2

    information?

    Confidential information used in cyberspace Confidential information and the issues of privacy in the virtual world Confidential information and the emerging right of publicity with regard to the

    protection of famous personal images and other indicia

    Lesson 3

    Patents and Inventions

    What is a patent? What does a patent protect? Why should an inventor apply for a grant of patents for his inventions and

    innovations?

    How to apply for a patent? What are the criteria for grant of a patent? What are the exclusive rights conferred upon a patent owner by the law? What remedies are available for a patent owner whose patent has been infringed? The global market place and the significant of patents

    Lesson 4Copyright

    What subject matters are protected by copyright? When does copyright subsist in a work? What are the exclusive rights of a copyright owner? How is copyright protection important and relevant to authors? When is copyright infringed? What are the consequences of infringement? What remedies are available to a copyright owner whose copyright in a work hasbeen infringed? The global market and copyright protection

    Lesson 5

    Trade Marks and Passing Off

    What are trade marks? How important are trade marks to businesses? What is the rationale for protecting trade marks? Registrability of trade marks What are the exclusive rights of a registered trade mark owner Infringement of registered trade marks What remedies are available to a registered trade mark owner whose trade mark

    has been infringed?

    Trade marks which are not registered can they be used? How to protect trade marks which are not registered?

  • 5/26/2018 1140

    3/5

    3

    Lesson 6

    Data Protection and Privacy Issues in Cyberspace

    Data protection laws Hacking and computer misuse Laws Privacy Issues and the protection of the law

    Lesson 7

    Patents & Computer-Related Inventions

    Can computer programs be patented? Can business methods be patented? Should they be protected?

    Lesson 8Computer Programs and Copyright

    Are computer programs protected by copyright? The protection of designs of circuits and semi-conductor products Multimedia works and copyright protection in cyberspace Copyright infringement in cyberspace

    Lesson 9

    Databases and Factual Compilations

    Databases and subsistence of copyright The creative originality vs. The sweat of the brow or labour investment Comparative analysis across jurisdictions: USA, UK, Canada, Australia and

    Singapore

    The proprietary models: The European Directive on the legal protection ofdatabases; The proposed WIPO Treaty 1996; The proposed database investment

    and Intellectual Property Antipiracy Act of 1996

    The alternative legal model: unfair competition/ misappropriation theoriesLesson 10

    Digital rights management information P2P file sharing and copyright piracy issues Criminalizing of copyright infringement in cyberspace The Right of communication to the public Rights and liabilities of internet service providers

    Lesson 11

    Trade Marks in Cyberspace What are domain names? What is the significance of domain names as an indicator of origin? What is cybersquatting? Resolution of Domain Names Disputes Issues on infringement and other unfair usage of trade marks over the Internet

    Lesson 12

  • 5/26/2018 1140

    4/5

    4

    The access challenge in the 21stcentury: emerging issues in intellectual property laws and

    knowledge governance

    Revision

    Modes of Teaching and Learning

    This module adopts a seminar style teaching. As the module is conducted over theSpecial Term, we meet two to three times in a week, each time for a period of 3 contact

    hours for a total of 6 weeks. The first 1 hour and 30 minutes of the seminar is typically

    spent on imparting the basic principles on the subject matter to the students. However, the

    students must be prepared to interact with the instructor during this session and thus, theymust have read the relevant reading materials before the seminar.

    The rest of the seminar time is devoted to case analysis and discussions to be preparedand presented by the students. These case analysis and discussions are the heart of the

    module as it is through careful dissection and systematic presentation of arguments of the

    issues found in these cases that the students truly learn to appreciate the significance of

    the issues and to critically evaluate their implications.

    Reading List

    1. Suggested Readings

    Reference Books:1. Computer Law, Fourth Edition, Edited by Chris Reed & John Angel;2. Introduction to Computer Law, Fourth Edition, David Bainbridge;3. The International Intellectual Property System: Commentary and Materials,

    Abbott, Cottier & Gurry

    Singapore Statutes:1. The Copyright Act 19872. The Patents Act 19943. The Trade Marks Act 19944. The Registered Designs Act 2000

    Cases:

    Selected Judicial Decisions.- These judicial decisions will form the pool of case analysis and discussions. They

    are selected from a number of jurisdictions such as Singapore, the United

    Kingdom, the United States, Australia and New Zealand.Students in the module are expected to read broadly and a list of relevant materials

    including journal articles will be made available to them in the beginning of term.

    Mode of Assessment

    1. Nature of CA and Final assessment

    This is an open book examination module.

  • 5/26/2018 1140

    5/5

    5

    CA consists of 2 Quizzes; Group Assignments and presentations; and class participation.

    The Final Examination consists of 1 compulsory question. The question takes the form of

    case analysis that requires the students to explore a myriad of issues and to formulate

    cogent arguments in relation to them.

    2. Break up of CA and Final assessment

    Quiz 20% (individual effort)

    Group Assignments and oral presentations 20% (group effort)Class participation 20% (individual effort)

    Final examinations 40% (individual effort)

    Prepared by:

    Susanna H.S. Leong

    Associate ProfessorDepartment of Strategy and Policy

    Special Term II, 2012/2013