Orphan Works, Abandonware and the Missing Market for Copyrighted Goods
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Reform(Aliz)Ing Copyright
SPRIGMAN FINAL 12/17/2004 3:36 PM REFORM(ALIZ)ING COPYRIGHT Christopher Sprigman* INTRODUCTION...................................................................................................... 486 I. THE TRADITIONAL CONTOURS OF “CONDITIONAL” COPYRIGHT ....................... 491 A. Formalities in the Early Copyright Statutes ................................................ 491 B. From Conditional to Unconditional Copyright ........................................... 494 1. Voluntary registration and notice............................................................. 494 2. Renewal .................................................................................................... 498 II. FORMALITIES AND THE “TRADITIONAL CONTOURS” OF CONDITIONAL COPYRIGHT .............................................................................................................................. 500 A. Recording Ownership.................................................................................. 500 1. “Signaling” .............................................................................................. 501 2. Maximizing private incentives .................................................................. 501 B. Formalities as a Copyright “Filter”............................................................ 502 1. Registration and notice............................................................................. 502 2. Renewal .................................................................................................... 519 3. Effect -
Module Ii Copyright and Related Rights
MODULE II COPYRIGHT AND RELATED RIGHTS Introduction General Part II of the TRIPS Agreement sets out the substantive standards for the protection of IP that WTO members should follow. This module outlines the provisions of Section 1 of Part II (running from Article 9 to Article 14), which sets out the protection that members must make available in the area of copyright and related rights – specifically, for literary and artistic works, performances, phonograms (or sound recordings) and broadcasts. This Section has to be read, like all other sections in Part II, together with the relevant provisions of certain pre-existing treaties in the area of international IP law that are incorporated by reference into the TRIPS Agreement. In the case of copyright, the relevant treaty is the Berne Convention; and on related rights, there are certain references to the Rome Convention. The relationship between the TRIPS Agreement and these Conventions is explained in section A3 below. As in the other areas of IP covered by the TRIPS Agreement, the provisions of Section 1 stipulate the minimum level of protection that members have to provide to nationals of other members. In other words, they determine the obligations that such members have towards each other. Given the long history of international cooperation on copyright matters, the national laws in this area are often fairly similar. However, to answer any question the reader may have on how the law applies in any practical situation, the applicable domestic law will have to be consulted. What are copyright and related rights? The term ‘copyright’ in its narrow sense usually refers to the rights of authors in their literary and artistic works. -
Wipo Intellectual Property Handbook Wipo Publication
WIPO INTELLECTUAL PROPERTY HANDBOOK WIPO PUBLICATION No. 489 (E) ISBN 978-92-805-1291-5 WIPO 2004 Second Edition Reprinted 2008 Detailed Table of Contents Chapter 1 Introduction The Concept of Intellectual Property 3 The World Intellectual Property Organization (WIPO) 4 History 4 Mission and Activities 5 Structure 7 Administration 8 Membership 9 Constitutional Reform 9 Wider Consultation and Outreach 12 Chapter 2 Fields of Intellectual Property Protection Patents 17 Introduction 17 Conditions of Patentability 17 Drafting and Filing a Patent Application 22 Examination of a Patent Application 24 Infringement 27 Exploitation of the Patented Invention 33 Compulsory Licenses 34 Utility Models 40 ii WIPO Intellectual Property Handbook: Policy, Law and Use Copyright and Related Rights 40 Introduction 40 Copyright Protection 41 Subject Matter of Copyright Protection 42 Rights Comprised in Copyright 43 Related Rights 46 Ownership of Copyright 49 Limitations on Copyright Protection 50 Piracy and Infringement 51 Remedies 52 Intellectual Property and Traditional Cultural Expressions 56 Trends and Experiences in the Protection of TCEs 64 Conceptual and Policy Questions 66 Recent and Possible Future Developments 67 Trademarks 67 Introduction 67 Definitions 68 Signs Which May Serve as Trademarks 70 Criteria of Protectability 71 Protection of Trademark Rights 77 Use Requirements 77 Trademark Registration 79 Removal of the Trademark from the Register 82 Trademark Piracy, Counterfeiting and Imitation of Labels and Packaging 90 Change of Ownership 92 Trademark -
Guarding Against Abuse: the Costs of Excessively Long Copyright Terms
GUARDING AGAINST ABUSE: THE COSTS OF EXCESSIVELY LONG COPYRIGHT TERMS By Derek Khanna* I. INTRODUCTION Copyrights are intended to encourage creative works through the mechanism of a statutorily created1 limited property right, which some prominent think tanks and congressional organizations have referred to as a form of govern- ment regulation.2 Under both economic3 and legal analysis,4 they are recog- * Derek Khanna is a fellow with X-Lab and a technology policy consultant. As a policy consultant he has never worked for any organizations that lobby or with personal stakes in copyright terms, and neither has Derek ever lobbied Congress. He was previously a Yale Law School Information Society Project Fellow. He was featured in Forbes’ 2014 list of top 30 under 30 for law in policy and selected as a top 200 global leader of tomorrow for spear- heading the successful national campaign on cell phone unlocking which led to the enact- ment of copyright reform legislation to legalize phone unlocking. He has spoken at the Con- servative Political Action Conference, South by Southwest, the International Consumer Electronics Show and at several colleges across the country as a paid speaker with the Fed- eralist Society. He also serves as a columnist or contributor to National Review, The Atlan- tic and Forbes. He was previously a professional staff member for the House Republican Study Committee, where he authored the widely read House Republican Study Committee report “Three Myths about Copyright Law.” 1 See Edward C. Walterscheld, Defining the Patent and Copyright Term: Term Limits and the Intellectual Property Clause, 7 J. -
Introduction About This Submission
COMMENTS ON DRAFT INTELLECTUAL PROPERTY POLICY OF THE FEDERAL DEMOCRATIC REPUBLIC OF ETHIOPIA Introduction About this Submission: The International Trademark Association (INTA) strongly supports the goal of this comprehensive Intellectual Property (IP) Policy for all nations, and appreciates the opportunity to contribute to the consultation process for Ethiopia under the guidance of the Ethiopian Intellectual Property Office (EIPO). While acknowledging the complexity of this task, INTA greatly commends the efforts of EIPO and appreciates the inclusiveness of the method. INTA further takes note: “The Government of Federal Democratic Republic of Ethiopia (FDRE) recognizes the role of intellectual property in meeting national and sectoral development goals and enhancing socio- economic development.” Although mindful of the holistic approach of the draft IP Policy, INTA’s expertise is in the area of trademarks, therefore, its input will focus on trademark policy and related rights. About INTA: Founded in 1878, INTA is the world’s oldest and largest brand owners association. With a membership of over 7,200 companies, INTA represents over 31,000 trademark professionals in diverse capacities: multinational corporations, businesses of all sizes, law firms and other professionals, academic institutions, and not-for-profit organizations from 190 countries. The mission of INTA is to encourage and support best practices and excellence in the field of trademarks and intellectual property, and protection of rights for brand owners and consumers, as well as foster economic growth and innovation through awareness of the importance and development of brands. INTA is dedicated to the support and advancement of trademarks and related intellectual property rights as elements of fair and effective national and international commerce. -
Copyrights in Perpetuity: Peter Pan May Never Grow up Jennifer S
Penn State International Law Review Volume 24 Article 18 Number 4 Penn State International Law Review 5-1-2006 Copyrights in Perpetuity: Peter Pan May Never Grow Up Jennifer S. Green Follow this and additional works at: http://elibrary.law.psu.edu/psilr Recommended Citation Green, Jennifer S. (2006) "Copyrights in Perpetuity: Peter Pan May Never Grow Up," Penn State International Law Review: Vol. 24: No. 4, Article 18. Available at: http://elibrary.law.psu.edu/psilr/vol24/iss4/18 This Comment is brought to you for free and open access by Penn State Law eLibrary. It has been accepted for inclusion in Penn State International Law Review by an authorized administrator of Penn State Law eLibrary. For more information, please contact [email protected]. SComments I Copyrights in Perpetuity: Peter Pan May Never Grow Up Jennifer S. Green* I. Introduction 2004 was known as "The Year of Peter Pan" throughout the United h Kingdom.' The country celebrated the 1 0 0t anniversary of the stage play, Peter Pan, with picnics in Neverland, charity balls, treasure hunts, and appearances by Peter Pan characters in the London Marathon. 2 A movie about author James Matthew Barrie's life leading up to the premiere of Peter Pan's first appearance on the London stage was * J.D. Candidate, The Dickinson School of Law of the Pennsylvania State University, 2006; B.A., University of Pittsburgh, 2003. This paper won the local level first place prize in the 2006 Nathan Burkan Memorial Comptition. This work is for my parents, Louise and Jan, who have given me their perpetual love and support. -
Establishing a Need for a Protocol for the Interoperability of Heterogeneous Iot Home Devices
Georgia Southern University Digital Commons@Georgia Southern Electronic Theses and Dissertations Graduate Studies, Jack N. Averitt College of Spring 2018 Establishing a Need for a Protocol for the Interoperability of Heterogeneous IoT Home Devices Jenna Bayto Follow this and additional works at: https://digitalcommons.georgiasouthern.edu/etd Part of the Computer Engineering Commons Recommended Citation Bayto, Jenna, "Establishing a Need for a Protocol for the Interoperability of Heterogeneous IoT Home Devices" (2018). Electronic Theses and Dissertations. 1742. https://digitalcommons.georgiasouthern.edu/etd/1742 This thesis (open access) is brought to you for free and open access by the Graduate Studies, Jack N. Averitt College of at Digital Commons@Georgia Southern. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons@Georgia Southern. For more information, please contact [email protected]. ESTABLISHING A NEED FOR A PROTOCOL FOR THE INTEROPERABILITY OF HETEROGENEOUS IOT HOME DEVICES by JENNA BAYTO (Under the Direction of Christopher Kadlec) ABSTRACT The Internet of Things (IoT) refers to the field of connecting devices consumers use every day to the internet. As the world relies on more and more internet-driven technological devices to control functions within the home, issues with compatibility of those devices are surfacing. This research was created to establish the need for standardization of IoT devices within the home. INDEX WORDS: Internet of -
'Sui Generis' Protection of Traditional Knowledge
A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Mathur, Ajeet Working Paper Missing markets in world trade the case for 'Sui generis' protection of traditional knowledge Working Paper, No. 141 Provided in Cooperation with: Indian Council for Research on International Economic Relations (ICRIER) Suggested Citation: Mathur, Ajeet (2004) : Missing markets in world trade the case for 'Sui generis' protection of traditional knowledge, Working Paper, No. 141, Indian Council for Research on International Economic Relations (ICRIER), New Delhi This Version is available at: http://hdl.handle.net/10419/176163 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents have been made available under an Open gelten abweichend von diesen Nutzungsbedingungen -
The Biodiversity Convention, Intellectual Property Rights, and Ownership of Genetic Resources
THE BIODIVERSITY CONVENTION, INTELLECTUAL PROPERTY RIGHTS, AND OWNERSHIP OF GENETIC RESOURCES: INTERNATIONAL DEVELOPMENTS PREPARED FOR: INTELLECTUAL PROPERTY POLICY DIRECTORATE INDUSTRY CANADA JANUARY, 1996 BARBARA LAINE KAGEDAN, CONSULTANT MEMBER, ONTARIO AND NEW YORK BARS 40 GENEVA STREET OTTAWA, ONTARIO K1Y 3N7 TEL.: (613) 724-3214 FAX: (613) 724-5860 E-MAIL: [email protected] This study was funded by the Intellectual Property Policy Directorate, Industry Canada. The study represents the opinions of the author who is solely responsible for its contents. It does not necessarily represent government policy. THE BIODIVERSITY CONVENTION, INTELLECTUAL PROPERTY RIGHTS, AND OWNERSHIP OF GENETIC RESOURCES: INTERNATIONAL DEVELOPMENTS TABLE OF CONTENTS EXECUTIVE SUMMARY ................................................... i ACRONYMS USED THROUGHOUT THE STUDY ............................. xi 1.0 INTRODUCTION ......................................................1 1.1 Background to the Review of International Developments ..............1 1.2 Methodology ..................................................3 1.3 Analytical Framework ...........................................4 2.0 ANALYSIS OF THE BIODIVERSITY CONVENTION: BIOTECHNOLOGY AND INTELLECTUAL PROPERTY RIGHTS (IPRs) ........................7 2.1 History and General Scope of the Biodiversity Convention .............8 2.2 The provisions concerning intellectual property rights ................10 2.2.1 Intellectual property rights on life forms ........................11 2.2.2 From common heritage -
Trademarks: More Than Meets the Eye
TRADEMARKS: MORE THAN MEETS THE EYE ∗ Vincent Chiappetta In recent years, the evolution of protection provided under trademark law has expanded in scope. This expansion has been regarded as a usurpation of rights which are outside the intention of the protections afforded under trademark law. This article advances a proposed resolution to this perceived problem by seeking to recast the paradigm by which the purpose of trademark law is interpreted. By bringing the purpose of trademark law in line with modern day economic reality, the appropriate boundaries of trademark protection can be achieved. This article begins by introducing the concept of an “encouragement based” trademark regime which seeks to maximize social value by creating incentive for investment while ensuring confusion avoidance. The article considers a brief justification for United States intellectual property law focusing on current propertization concerns. Next, the article argues for the inclusion of incentives in trademark law consistent with use in contemporary culture. Finally, the "encouragement" paradigm is used to consider the mounting pressures coming to bear on current trademark dilemmas. The article concludes that the "encouragement" paradigm is an advancement in the trademark analytical framework and will aid in resolving current concerns while preparing to meet future challenges in this area. I. INTRODUCTION By all accounts, the “propertization” of trademark law is out of control,1 with the regime providing rights flagrantly unplugged2 from the ∗ Professor, Willamette University College of Law. My thanks to Professor Dennis Karjala and an anonymous Journal reviewer for a number of extremely useful comments. The author gratefully acknowledges a Willamette University College of Law research grant made in connection with the preparation of this article. -
Broken Technologies
Broken Technologies 2 The Angel of Machines: from Buch der Erfindungen Gewerbe und Industrien,or Book of Inven- tions,Vol.6,1887, F.Reuleaux, Editor. From Moon, Francis C. The Machines of Leonardo da Vinci and Franz Reuleaux. Kinematics of Machines from the Renaissance to the 20th Century. Springer, 2007. FrontPage: © Maria Flores Crossa 3 Broken Technologies The Humanist as Engineer Fernando Flores Morador Lund University 2011- revised 2015 4 Department of History of Ideas and Science University of Lund Broken Technologies. The Humanist as Engineer. Ver 3.0 Biskopsgatan 7, 223 62 Lund © Fernando Flores Morador, 2009, Third Edition Cover: Maria Flores Crossa Tryck: Media – Tryck, Lunds Universitet, 2011-revised 2015 ISBN: 978-91-633-9692-2 5 Contents Contents ....................................................................................................................................... 5 List of figures .................................................................................................................................. 7 List of Tables.................................................................................................................................. 9 Foreword .................................................................................................................................. 11 First Edition (Ver. 1.0) ................................................................................................................ 11 Second edition (Ver. 1.1) ........................................................................................................... -
Weaponizing Vulnerabilities in Security Scanners
Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners Andrea Valenza Gabriele Costa University of Genova IMT School for Advanced Studies Lucca [email protected] [email protected] Alessandro Armando University of Genova [email protected] Abstract A naive scanning system might extract the value of the Server nginx/1.17.0 The first step of every attack is reconnaissance, i.e., to ac- field (namely, the string in the above quire information about the target. A common belief is that example) and include it in the HTML report. This implicitly there is almost no risk in scanning a target from a remote allows the scan target to access the scan author’s browser and location. In this paper we falsify this belief by showing that inject malicious payloads. scanners are exposed to the same risks as their targets. Our In this paper we investigate this attack scenario. We start methodology is based on a novel attacker model where the by defining an attacker model that precisely characterizes scan author becomes the victim of a counter-strike. We devel- the threats informally introduced above. To the best of our oped a working prototype, called RevOK, and we applied it to knowledge, this is the first time that such an attacker model is 78 scanning systems. Out of them, 36 were found vulnerable defined in literature. Inspired by the attacker model, we de- to XSS. Remarkably, RevOK also found a severe vulnerability fine an effective methodology to discover cross-site scripting in Metasploit Pro, a mainstream penetration testing tool.