Escolar Documentos
Profissional Documentos
Cultura Documentos
Chapter-1
TRADEMARK
1.1.2 Some Examples Of Cyber Crime Financial crimes This would include cheating, credit card frauds, money laundering etc. To cite a recent case, a website offered to sell Alphonso mangoes at a throwaway price. Distrusting such a transaction, very few people responded to or supplied the website with their credit card numbers. These people were actually sent the Alphonso mangoes. The word about this website now spread like wildfire. Thousands of people from all over the country responded and ordered mangoes by providing their credit card numbers. The owners of what was later proven to be a bogus website then fled taking the numerous credit card numbers and proceeded to spend huge amounts of money much to the chagrin of the card owners. Cyber pornography This would include pornographic websites. pornographic magazines produced using computers (to publish and print the material) and the Internet (to download and transmit pornographic pictures, photos, writings etc). Recent Indian incidents revolving around cyber pornography include the Air Force Balbharati School case. A student of the Air Force Balbharati School, Delhi, was teased by all his classmates for having a pockmarked face. Tired of the cruel jokes, he decided to get back at his tormentors. He scanned photographs of his classmates and teachers, morphed them with nude photographs and put them up on a website that he uploaded on to a free web hosting service. It was only after the father of one of the class girls featured on the website objected and lodged a complaint with the police that any action was taken. Sale of illegal articles This would include sale of narcotics, weapons and wildlife etc., by posting information on websites, auction websites, and bulletin boards or 167 simply by using email communication. E.g. many of the auction sites even in India are believed to be selling cocaine in the name of 'honey'. Online gambling There are millions of websites. all hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually fronts for money laundering. Intellectual Property crimes These include software piracy, copyright infringement, trademarks violations, theft of computer source code etc. Email spoofing
TRADEMARK
A spoofed email is one that appears to originate from one source but actually has been sent from another source Email spoofing can also cause monetary damage. In an American case, a teenager made millions of dollars by spreading false information about certain companies whose shares he had short sold. This misinformation was spread by sending spoofed emails, purportedly from news agencies like Reuters, to share brokers and investors who were informed that the companies were doing very badly. Even after the truth came out the values of the shares did not go back to the earlier levels and thousands of investors lost a lot of money. Forgery Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using sophisticated computers, printers and scanners. Outside many colleges across India, one finds touts soliciting the sale of fake mark sheets or even certificates. These are made using computers, and high quality scanners and printers. In fact, this has becoming a booming business involving thousands of Rupees being given to student gangs in exchange for these bogus but authentic looking certificates. Cyber Defamation This occurs when defamation takes place with the help of computers and / or the Internet. E.g. someone publishes defamatory matter about someone on a website or sends e-mails containing defamatory information to all of that person's friends. Cyber stalking The Oxford dictionary defines stalking as "pursuing stealthily". Cyber stalking involves following a person's movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc. 1.1.3 Frequently Used Cyber Crimes Unauthorized access to computer systems or networks This activity is commonly referred to as hacking. The Indian law has however given a different connotation to the term hacking, so we will not use the term "unauthorized access" interchangeably with the term "hacking". Theft of information contained in electronic form This includes information stored in computer hard disks, removable storage media etc. Email bombing
TRADEMARK
Email bombing refers to sending a large number of emails to the victim resulting in the victim's email account (in case of an individual) or mail servers (in case of a company or an email service provider) crashing. In one case, a foreigner who had been residing in Simla, India for almost thirty years wanted to avail of a scheme introduced by the Simla Housing Board to buy land at lower rates. When he made an application it was rejected on the grounds that the 169 schemes were available only for citizens of India. He decided to take his revenge. Consequently he sent thousands of mails to the Simla Housing Board and repeatedly kept sending e-mails till their servers crashed. Data diddling This kind of an attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed. Electricity Boards in India have been victims to data diddling programs inserted when private parties were computerizing their systems. Salami attacks These attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. E.g. a bank employee inserts a program, into the bank's servers, that deducts a small amount of money (say Rs. 5 a month) from the account of every customer. No account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month. Denial of Service attack This involves flooding a computer resource with more requests than it can handle. This causes the resource (e.g. a web server) to crash thereby denying authorized users the service offered by the resource. Another variation to a typical denial of service attack is known as a Distributed Denial of Service (DDoS) attack wherein the perpetrators are many and are geographically widespread. It is very difficult to control such attacks. The attack is initiated by sending excessive demands to the victim's computer(s), exceeding the limit that the victim's servers can support and making the servers crash. Denial-of-service attacks have had an impressive history having, in the past, brought down websites like Amazon, CNN, Yahoo and eBay! Virus / worm attacks Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms, unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they
TRADEMARK
eat up all the available space on a computer's memory selects certain files and then inserts its own code in lieu of the original data contained in the file. This way it creates ever-increasing versions of itself. Probably the world's most famous worm was the Internet worm let loose on the Internet by Robert Morris sometime in 1988. Logic bombs These are event dependent programs. This implies that these programs are created to do something only when a certain event (known as a trigger event) occurs. E.g. even some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date (like the Chernobyl virus). Trojan attacks A Trojan as this program is aptly called, is an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing. There are many simple ways of installing a Trojan in someone's computer. To cite and example, two friends Rahul and Mukesh (names changed), had a heated argument over one girl, Radha (name changed) whom they both liked. When the girl, asked to choose, chose Mukesh over Rahul, Rahul decided to get even. On the 14th of February, he sent Mukesh a spoofed ecard, which appeared to have come from Radha's mail account. The e-card actually contained a Trojan. As soon as Mukesh opened the card, the Trojan was installed on his computer. Rahul now had complete control over Mukesh's computer and proceeded to harass him thoroughly. Internet time thefts This connotes the usage by an unauthorized person of the Internet hours paid for by another person. In a case reported before the enactment of the Information Technology Act, 2000 Colonel Bajwa, a resident of New Delhi, asked a nearby net caf owner to come and set up his Internet connection. For this purpose, the net caf owner needed to know his username and password. After having set up the connection he went away with knowing the present username and password. He then sold this information to another net caf. One week later Colonel Bajwa found that his Internet hours were almost over. Out of the 100 hours that he had bought, 94 hours had been used up within the span of that week. Web jacking This occurs when someone forcefully takes control of a website (by cracking the password and later changing it). The actual owner of the website does not have any more control over what appears on that website. Theft of computer system
TRADEMARK
This type of offence involves the theft of a computer, some part(s) of a computer or a peripheral attached to the computer. Physically damaging a computer system This crime is committed by physically damaging a computer or its peripherals.
TRADEMARK
Chapter 2
COPYRIGHT
2.1 GENERAL INTRODUCTION Copyright is a property right that subsists in a number of works. It is not necessary to register copyright it arises automatically. The copyright work must be in a material form, however, in order to be protected - copyright is not a right in ideas, it protects the expression of an idea. The Copyright, Designs and Patents Act (CDPA) 1988 gives authors certain economic and moral rights in their works. Copyright subsists in the following works: Original literary works (including computer software) Original musical works Original artistic works Original dramatic works Films Sound recordings Broadcasts, including broadcasts by wire or cable. Typographical arrangements of published editions
It should be noted that in the United Kingdom the lyrics of a song and the musical score are protected separately being literary and musical works respectively. 2.1.1 How long does copyright protection last? Copyright in original musical, literary, dramatic and artistic works lasts until 70 years after the death of the author. The copyright in films also lasts for 70 years after the death of the last to survive of the principal director, author of the screenplay and dialogue and the composer of the music created specifically for the film. Copyright protection in sound recordings and broadcasts exists for 50 years from the end of the calendar year in which it was made or released. Copyright in the typographical arrangement of published editions exists for 25 years from first publication. Where the work has originated from outside the European Economic Area (EEA) or the author is not an EEA national the situation is slightly different. In this situation the copyright will generally last for as long as the work attracts copyright protection in the country of origin (usually the country where the work is first published) or if not published, the author's national country as long as that period does not exceed the period for which UK copyright law protects works of EEA origin. 2.1.1.1 Authorship and Ownership of Copyright
TRADEMARK
Authorship The author of a copyright work is generally the person who creates it. In relation to sound recordings this is the producer. In films the principal director and producer are joint authors. The author of a broadcast is the person who made it. Finally the publisher of a typographical arrangement of a published edition is the author of it. Where two or more people collaborate in creating a work and their individual contributions are not distinct they are joint authors of that work. So where two or more persons do collaborate but it is possible to determine the separate parts attributable to each author it will not be a work of joint authorship. Ownership Generally the author of the work is the first owner of copyright and therefore those people mentioned above are also the first owners. If a literary, musical, dramatic, artistic work or film is made in the course of employment, however, the employer is the first owner of the copyright, unless there is any agreement to the contrary. It is important to distinguish ownership of a physical product with the ownership of the copyright embodied within it. For example the purchase of a CD does not mean that the purchaser owns the copyright in the musical or literary work within it or the copyright in the sound recording. Therefore purchasing a CD alone does not entitle the purchaser to copy the work or do any other acts which are restricted to the copyright owner.
TRADEMARK
The author of a copyright literary, dramatic, musical or artistic work and the principal director of a film have the following moral rights in relation to their work: Paternity right - The right to be identified as the author, such as having his name printed on his work. The right has to be asserted by the author in order to have effect. False attribution - A person has the right not to have a work, which they have not created, falsely attributed to him. Integrity Right - The author has the right not to have his work subjected to derogatory treatment, he can object to any distortion or mutilation of his work prejudicial to his honor or reputation or of a director. There is a further moral right which is not granted to an author of a work: Privacy in photographs-This is a very specific moral right and relates to the situation where a private photograph has been commissioned for private and domestic purposes. In such a situation the copyright of the photograph will vest in the photographer, but this moral right allows the subject of the photograph to prevent any general distribution, exhibition or communication of it. Generally moral rights exist for as long as copyright exists in the work, with the exception of false attribution which lasts until 20 years after a persons death. Moral rights may be waived but cannot be assigned and so do not pass with any assignment or license of the copyright.
TRADEMARK
It is possible to license a right instead of assigning it. In granting a license the copyright owner merely gives another person permission to use that right for the particular purpose as agreed in the license terms. Licensing is more flexible than assignment as it is possible to license many people to use copyright simultaneously (a non-exclusive license). Licenses can be limited as to what can be done and can be limited in time. It is also possible to give an 'exclusive license'. This means the copyright owner grants a person permission to exercise a particular right exclusively (even to the exclusion of the copyright owner themselves). An exclusive license can be limited in the rights given and the time period. An exclusive license must be in writing and signed by or on behalf of the copyright owner granting the license.
Fair dealing acts differ from other exceptions to copyright in that these involve an assessment as to whether the dealing is fair. In determining this issue the courts have generally considered three main questions. First is the person really using the work for the stated purpose? For example, if an entire work has been used and it is followed by two lines of vague review this is will not constitute use for the purpose of criticism and review. If the use has not been for one of the stated purposes it will not fall within fair dealing and as such any use without permission will be an infringement. If the work has been used for one of stated purposes the court will then consider whether the use of the work was fair in all the circumstances. Such an assessment will involve a number of factors and will depend upon the particular circumstances of each case. Finally in order to benefit from a fair dealing exception a sufficient acknowledgement must accompany the work (with the exception of reporting current events by means of sound recording film or broadcast). This means that there must be a visible notice demonstrating the claim that the copyright owner has to his work. 2.4.2 Exceptions There are also a number of general exceptions in the Copyright Act for a variety of purposes. Broadly these are:
10
TRADEMARK
Educational exceptions - exceptions in relation to specific acts taking place in teaching and educational establishments. Library and archiving exceptions - exceptions relating to various aspects of libraries and archiving, such as. libraries make copies for use in non-commercial research, or for archiving material. Public administration - exceptions relating to various parliamentary/judicial functions and public information, such as reporting legal cases. Incidental inclusion of the copyright work - this exception relates to the situation where for example a documentary is being filmed and incidentally includes a passing car playing copyright music or a building or sculpture which is a copyright work. These incidental inclusions would be excepted from copyright liability. However, the Copyright, Designs and Patents Act 1988 provides that where music is in fact deliberately included, it will not be possible for a person to claim incidental inclusion. Lawful use of a computer program/database - a person who is lawfully using a computer program or database is allowed to make back-up copies and in certain circumstances de-compile programs, however, it must be noted this is only where the initial use is lawful. Time shifting - a limited exception is allowed so that a person in private and domestic circumstances can copy a broadcast (and the copyright works embodied in it) to watch or listen to at a more convenient time.
2.5 Remedies
If a person carries out one of the restricted acts without the copyright owners permission, the copyright owner is able to take action for infringement. It should be noted here that an exclusive licensee has the same right as the copyright owner in this respect and therefore can also take action for copyright infringement. There are a number of remedies that the copyright owner can obtain from the Court in a civil action for copyright infringement. These are: Injunctions - this is a very important remedy as it allows the copyright owner to get a court order prohibiting any further infringement. Damages - in any action for copyright infringement it is possible for the copyright owner to obtain damages for his loss. This is often based on what would have been a reasonable licence fee. In the event that the infringement has been particularly flagrant he will be able to get punitive damages in addition to the basic amount. As an alternative, a copyright owner can elect to have an account of the infringers profit. Order for 'delivery up' of infringing articles - the Court can order that the infringing party deliver all infringing articles into Court so that he no longer has them in his possession.
11
TRADEMARK Right to seize infringing copies - it is possible for the copyright owner after informing the police to seize infringing copies. The MCPS Anti-piracy Unit conduct raids on suspected parties to seize illegal product, such as counterfeit or pirate CDs.
12
TRADEMARK
other similar officer of that company that person, as well as the company will be liable for the offence.
To copy the work To issue copies of the work to the public To rent or lend the work to the public
These rights are known as mechanical rights although this is not a term used in the Copyright, Designs and Patents Act (CDPA) 1988 or the Membership Agreement. MCPS acts in a number of different ways according to the authority given to it by its members. In several areas, such as licensing record companies for the reproduction of musical works into sound recordings, MCPS acts exclusively for all members. In some specific areas MCPS can only grant a license where the member has given MCPS a specific mandate to do so, for example music used in videos or television advertisements. MCPS licenses others for a particular use of a work or a catalogue in return for a royalty, which after deducting a commission it allocates and distributes to its members.
13
TRADEMARK
Chapter 3
14
TRADEMARK states that any act of competition contrary to honest practices in industrial and commercial matters constitutes an act of unfair competition The expression industrial property covers inventions and industrial designs. Simply stated, inventions are new solutions to technical problems and industrial designs are aesthetic creations determining the appearance of industrial products. In addition, industrial property includes trademarks, service marks, commercial names and designations, including indications of source and appellations of origin, and protection against unfair competition. Here, the aspect of intellectual creationsalthough existentis less prominent, but what counts here is that the object of.
3.3 PATENTSWHAT IT Is
A Patent is an intellectual property right relating to inventions and is the grant of exclusive right, for limited period, provided by the Government to the patentee, in exchange of full disclosure of his invention, for excluding others, from making, using, selling, importing the patented product or process producing that product for those purposes. The purpose of this system is to encourage inventions by promoting their protection and utilization so as to
15
TRADEMARK
contribute to the development of industries, which in turn, contributes to the promotion of technological innovation and to the transfer and dissemination of technology. Under the system, Patents ensure property a right (legal title) for the invention for which patent has been granted, which may be extremely valuable to an individual or a Company. One should make the fullest possible use of the Patent System and the benefits it provides. Patent right is territorial in nature and a patent obtained in one country is not enforceable in other country. The inventors/their assignees are required to file separate patent applications in different countries for obtaining the patent in that country. 3.3.1 LEGISLATION The Patent System in India is governed by the Patents Act, 1970 (No. 39 of 1970) as amended by the Patents (Amendment) Act, 2005 and the Patents Rules, 2003, as amended by the Patents (Amendment) Rules 2006 effective from 05-05-2006. 3.3.2 ADMINISTRATION The Patent Office, under the Department of Industrial Policy & Promotion, Ministry of Commerce & Industry, performs the statutory duties in connection with the grant of patents for new inventions and registration of industrial designs. Patent Offices are located at Kolkata, Mumbai, Chennai and Delhi to deal with the applications for patents originating within their respective territorial jurisdictions. 3.3.3 TYPES OF PATENT APPLICATIONS a) Ordinary Application b) Application for Patent of Addition (granted for Improvement or Modification of the already patented invention, for an unexpired term of the main patent). c) Divisional Application (in case of plurality of inventions disclosed in the main application). d) Convention application, claiming priority date on the basis of filing in Convention Countries. e) National Phase Application under PCT. 3.3.4 WHO MAY APPLY The inventor may make an application, either alone or jointly with another, or his/their assignee or legal representative of any deceased inventor or his assignee. 3.3.5 WHAT IS PATENTABLE INVENTION
16
TRADEMARK
A new product or process, involving an inventive step and capable of being made or used in an industry. It means the invention to be patentable should be technical in nature and should meet the following criteria 3 i) Novelty: The matter disclosed in the specification is not published in India or elsewhere before the date of filing of the patent application in India. ii) Inventive Step: The invention is not obvious to a person skilled in the art in the light of the prior publication/knowledge/ document. iii) Industrially applicable: Invention should possess utility, so that it can be made or used in an industry. 3.3.6 WHAT IS NOT PATENTABLE The following are Non-Patentable inventions within the meaning of the Act: (a) An invention which is frivolous or which claims anything obviously contrary to well established natural laws. (b) an invention the primary or intended use or commercial exploitation of which could be contrary to public order or morality or which causes serious prejudice to human, animal or plant life or health or to the environment. (c) the mere discovery of a scientific principle or the formulation of an abstract theory (or discovery of any living thing or non-living substances occurring in nature). (d) the mere discovery of a new form of a known substance which does not result in the enhancement of the known efficacy of that substance or the mere discovery of any new property or mere new use for a known substance or of the mere use of a known process, machine or apparatus unless such known process results in a new product or employs at least one new reactant. Explanation - For the purposes of this clause, salts, esters, ethers, polymorphs, metabolites, pure form, particle size, isomers, mixtures of isomers, complexes, combinations and other derivatives of known substance shall be considered to be the same substance, unless they differ significantly in properties with regard to efficacy. (e) a substance obtained by a mere admixture resulting only in the aggregation of the properties of the components thereof or a process for producing such substance. (f) the mere arrangement or re-arrangement or duplication of known devices each functioning independently of one another in a known way. (g) a method of agriculture or horticulture. (h) any process for the medicinal, surgical, curative, prophylactic, diagnostic, therapeutic or other treatment of human beings or any process for a similar treatment of animals to render them free of disease or to increase their economic value or that of their products.
17
TRADEMARK
(i) plants and animals in whole or any part thereof other than micro-organisms but including seeds, varieties and species and essentially biological processes for production or propagation of plants and animals. (j) a mathematical or business method or a computer programme per se or algorithms. (k) a literary, dramatic, musical or artistic work or any other aesthetic creation whatsoever including cinematographic works and television productions. (l) a mere scheme or rule or method of performing mental act or method of playing game. 3.3.7 APPROPRIATE OFFICE FOR FILING AN APPLICATION & FOR OTHER PROCEEDINGS Application is required to be filed according to the territorial limits where the applicant or the first mentioned applicant in case of joint applicants, for a patent normally resides or has domicile or has a place of business or the place from where the invention actually originated. If the applicant for the patent or party in a proceeding having no business place or domicile in India, the appropriate office will be according to the address for service in India given by the applicant or party in a proceeding . The appropriate office once decided in respect of any proceedings under the Act shall not ordinarily be changed. The four patent offices are located at Kolkata, Mumbai, Delhi & Chennai.
18
TRADEMARK
Chapter -4
19
TRADEMARK
No. You can establish rights in a mark based on use of the mark in commerce, without a registration. However, owning a federal trademark registration on the Principal Register provides several advantages, including: Public notice of your claim of ownership of the mark. A legal presumption of your ownership of the mark and your exclusive right to use the mark nationwide on or in connection with the goods/services listed in the registration. The ability to bring an action concerning the mark in federal court. The use of the U.S. registration as a basis to obtain registration in foreign countries. The ability to record the U.S. registration with the U.S. Customs and Border Protection (CBP) Service to prevent importation of infringing foreign goods. The right to use the federal registration symbol . and Listing in the United States Patent and Trademark Offices online databases. 4.2.2 When can I use the trademark symbols TM, SM, and ? If you claim rights to use a mark, you may use the TM (trademark) or SM (service mark) designation to alert the public to your claim of ownership of the mark, regardless of whether you have filed an application with the United States Patent and Trademark Office (USPTO). However, you may only use the federal registration symbol after the USPTO actually registers a mark, and not while an application is pending. You may only use the registration symbol with the mark on or in connection with the goods/services listed in the federal trademark registration. Note: Several foreign countries use to indicate that a mark is registered in that country. Use of the symbol by the holder of a foreign registration may be proper.
United Kingdom: 1876 The Bass Brewerys Red Triangle for ale was the first trademark to be registered under the Trade Mark Registration Act 1875.
20
TRADEMARK
United States: 1884 A picture of Samson wrestling a lion was registered to J.P. Tolman Company.
In 1980, there were fewer than ten thousand registered high tech trademarks in the United States. In 2011, there are more than 300,000.
4.4 REGISTRATION
The law considers a trademark to be a form of property. Proprietary rights in relation to a trademark may be established through actual use in the marketplace, or through registration of the mark with the trademarks office (or "trademarks registry") of a particular jurisdiction . In some jurisdictions, trademark rights can be established through either or both means. Certain jurisdictions generally do not recognize trademarks rights arising through use. If trademark owners do not hold registrations for their marks in such jurisdictions, the extent to which they will be able to enforce their rights through trademark infringement proceedings will therefore be limited. In cases of dispute, this disparity of rights is often referred to as "first to file" as opposed to "first to use." Other countries such as Germany offer a limited amount of common law rights for unregistered marks where to gain protection, the goods or services must occupy a highly significant position in the marketplace where this could be 40% or more market share for sales in the particular class of goods or services. In the United States the registration process entails several steps prior to a trademark receiving its Certificate of Registration. First, an Applicant, the person or persons applying for the registration, files an application to register the respective trademark. The application is then placed in line in the order it was received to be examined by an examining attorney for the U.S. Patent and Trademark Office. Second, following a period of anywhere from three to six months the application is reviewed by an examining attorney to make sure it complies with all requirements in order to be entitled to registration. This review includes procedural matters such as making sure the applicant's goods or services are identified properly. It also includes more substantive matters such as making sure the applicant's mark is not merely descriptive or likely to cause confusion with a pre-existing applied-for or registered mark.[10] If the application runs afoul of any requirement, the examining attorney will issue an office action requiring the applicant to address certain issues or refusals prior to registration of the mark. Third, and after the examination of the mark has concluded with no issues to be addressed or an applicant has responded adequately to an examining attorney's concerns, the application will be published for opposition. During this 30-day period third-parties who may be affected by the registration of the trademark may step forward to file an Opposition Proceeding to stop the registration of the mark. If an Opposition proceeding is filed it institutes
21
TRADEMARK
a case before the Trademark Trial and Appeal Board to determine both the validity of the grounds for the opposition as well as the ability of the applicant to register the mark at issue. Fourth, provided that no third-party opposes the registration of the mark during the opposition period or the opposition is ultimately decided in the applicant's favor the mark will be registered in due course. Outside of the United States the registration process is substantially similar to that found in the U.S. save for one notable exception in many countries: registration occurs prior to the opposition proceeding. In short, once an application is reviewed by an examiner and found to be entitled to registration a registration certificate is issued subject to the mark being open to opposition for a period of typically 6 months from the date of registration. A registered trademark confers a bundle of exclusive rightsupon the registered owner, including the right to exclusive use of the mark in relation to the products or services for which it is registered. The law in most jurisdictions also allows the owner of a registered trademark to prevent unauthorized use of the mark in relation to products or services which are identical or "colourfully" similar to the "registered" products or services, and in certain cases, prevent use in relation to entirely dissimilar products or services. The test is always whether a consumer of the goods or services will be confused as to the identity of the source or origin. An example may be a very large multinational brand such as "Sony" where a non-electronic product such as a pair of sunglasses might be assumed to have come from Sony Corporation of Japan despite not being a class of goods that Sony has rights in. Once trademark rights are established in a particular jurisdiction, these rights are generally only enforceable in that jurisdiction, a quality which is sometimes known as territoriality. However, there is a range of international trademark laws and systems which facilitate the protection of trademarks in more than one jurisdiction (see International trademark laws below). The application must be filed in the name of the owner of the mark. The owner of the mark is the person or entity who controls the nature and quality of the goods/services identified by the mark. The owner is not necessarily the name of the person filling out the form. The owner may be an individual, corporation, partnership, LLC, or other type of legal entity.
22
TRADEMARK
food and drink. temporary accommodation), 44 (Medical services. veterinary services. hygienic and beauty care for human beings or animals. agriculture, horticulture and forestry services), and 45 (Legal services. security services for the protection of property and individuals.-personal and social services rendered by others to meet the needs of individuals). In addition, it has modified class 42 (Scientific and technological services and research and design relating thereto. industrial analysis and research services. design and development of computer hardware and software) to conform to the Nice Classification. This change impacts new registrations for those classes, as well as registered marks and pending applications for class 42. Pending applicants for Class 42 must now seek reclassification using Form TM-16 (Request for correction of clerical error, or for amendment). Owners of marks registered in class 42 but which now fall into other classes or across classes must be reclassified using form TM-40 (Application by the proprietor of a registered trade mark for the conversion of the specification). This will not change the original date of registration. The Madrid Protocol Further strengthening intellectual property rights in India is the countrys recent decision to ratify the Madrid Protocol governing the international registration of trademarks. It is expected that the Indian government will complete the ratification process by the end of 2010. Once this is achieved, multinational brand owners will be able to designate India when filing international trademark applications under the Madrid Protocol, streamlining the registration process. In addition, Indian companies will be able file for international protection of their marks more easily and cost-effectively, promoting global expansion of their brands. Adoption of the Madrid Protocol marks a major step forward in enabling international registration of Indian trademarks. Administered by the World Intellectual Property Organization (WIPO), the Madrid Protocol offers a low-cost method of registering and renewing trademarks in other participating countries. Applicants can apply for trademark protection in some or all of the Madrid Protocol countries with a single application. A key provision of the Madrid Protocol is that all unopposed trademark applications be registered within 18 months of the application date. Intended to accelerate the process, this provision will undoubtedly place even greater pressure on Indias Trademark Registry to improve and modernize its infrastructure.
AND
DISADVANTAGES
OF
ASSIGNING
If you assign your trade mark you may receive a one off lump sum to get back the cost of registration. You may also be able to negotiate a price for your mark, with the other party.
23
TRADEMARK
An assignment of trade mark can release you from the ongoing responsibility on the ongoing management and enforcement of the trade mark. There is also no ongoing responsibility. 4.6.2 Disadvantages
As you are selling your trade mark you will relinquish all control over it. It can be difficult to value your trade mark and you may lose out to licensing in the long term.
AND
DISADVANTAGES
OF
LICENSING
Advantages You may be able to retain control over your trade mark and how it is used You may be able to obtain ongoing royalty payments. It may be possible to maximise exploitation in terms of territory, goods or services covered and volume of sales
4.7.2 Disadvantages
If an agreement between the licensor and licensee broke down, the ex-licensee may become a competitor and seek to challenge the validity of the trade mark. There will be continuing obligations with the licence of a trade mark. This includes the need to enforce rights on behalf of the licensees for example enforcing trade mark infringement.
24
TRADEMARK
Chapter-5
25
TRADEMARK
Chapter-XI of the Act talks about various offences and the said offences shall be investigated only by a Police Officer not below the rank of the Deputy Superintendent of Police. These offences include tampering with computer source documents, publishing of information, which is obscene in electronic form, and hacking.
TRADEMARK were issued on 9th July 2001. Next were the Guidelines for submission of certificates and certification revocation lists to the Controller of Certifying Authorities for publishing in National Repository of Digital Certificates. These were issued on 15th December 2002. 5.2.7 Cyber Regulations Appellate Tribunal (Procedure) Rules, 2000 The Cyber Regulations Appellate Tribunal (Procedure) Rules, 2000 also came into force on 17th October 2000. These rules prescribe the appointment and working of the Cyber Regulations Appellate Tribunal (CRAT) whose primary role is to hear appeals against orders of the Adjudicating Officers. 5.2.8 Cyber Regulations Appellate Tribunal (Salary, Allowances and other terms and Conditions of service of Presiding Officer) Rules, 2003 The Cyber Regulations Appellate Tribunal (Salary, Allowances and other terms and conditions of service of Presiding Officer) Rules, 2003 prescribe the salary, allowances and other terms for the Presiding Officer of the CRAT. 5.2.9 Information Technology (Other powers of Civil Court vested in Cyber Appellate Tribunal) Rules 2003 Information Technology (Other powers of Civil Court vested in Cyber Appellate Tribunal) Rules 2003 provided some additional powers to the CRAT. 5.2.10 Information Technology (Qualification and Experience of Adjudicating Officers and Manner of Holding Enquiry) Rules, 2003 These rules prescribe the qualifications required for Adjudicating Officers. Their chief responsibility under the IT Act is to adjudicate on cases such as unauthorized access, unauthorized copying of data, spread of viruses, denial of service attacks, disruption of computers, computer manipulation etc. These rules also prescribe the manner and mode of inquiry and adjudication by these officers. The appointment of adjudicating officers to decide the fate of multi-crore cyber crime cases in India was the result of the public interest litigation filed by students of Asian School of Cyber Laws (ASCL). The Government had not appointed the Adjudicating Officers or the Cyber Regulations Appellate Tribunal for almost 2 years after the passage of the IT Act. This prompted ASCL students to file a Public Interest Litigation (PIL) in the Bombay High Court asking for a speedy appointment of Adjudicating officers. Following this the Central Government passed an order dated 23rd March 2003 appointing the Secretary of Department of Information Technology of each of the States or of Union Territories of India as the adjudicating officers. 5.2.11 Information Technology (Security Procedure) Rules, 2004
27
TRADEMARK The Information Technology (Security Procedure) Rules, 2004 came into force on 29 th October 2004. They prescribe provisions relating to secure digital signatures and secure electronic records. Also relevant are the Information Technology (Other Standards) Rules, 2003. 5.2.12 Order relating to blocking of websites An important order relating to blocking of websites was passed on 27th February, 2003. Computer Emergency Response Team (CERT-IND) can instruct Department of Telecommunications (DOT) to block a website.
28
TRADEMARK
Chapter-6
29
TRADEMARK
B, such that party B misrepresents as being the owner of the trademark or having some affiliation/nexus with party A, thereby damaging the goodwill of party A. For an action of passing off, registration of a trademark is irrelevant. Registration of a trademark is not a pre-requisite in order to sustain a civil or criminal action against violation of trademarks in India. In India, a combined civil action for infringement of trademark and passing off can be initiated. Significantly, infringement of a trademark is a cognizable offence and criminal proceedings can be initiated against the infringers. Such enforcement mechanisms are expected to boost the protection of marks in India and reduce infringement and contravention of trademarks. Relief granted by Courts in Suits for Infringement and Passing off The relief which a court may usually grant in a suit for infringement or passing off includes permanent and interim injunction, damages or account of profits, delivery of the infringing goods for destruction and cost of the legal proceedings. The order of interim injunction may be passed ex parte or after notice. The Interim reliefs in the suit may also include order for: (a) Appointment of a local commissioner, which is akin to an Anton Pillar Order, for search, seizure and preservation of infringing goods, account books and preparation of inventory, etc. (b) Restraining the infringer from disposing of or dealing with the assets in a manner which may adversely affect plaintiffs ability to recover damages, costs or other pecuniary remedies which may be finally awarded to the plaintiff. Offences and Penalties In case of a criminal action for infringement or passing off, the offence is punishable with imprisonment for a term which shall not be less than six months but which may extend to three years and fine which shall not be less than INR 50,000 but may extend to INR 200,000.
6.1.2 CYBER LAWS IN INDIA Cyber Law is the law governing cyber space. Cyber space is a very wide term and includes computers, networks, software, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc. Law encompasses the rules of conduct: 1. That have been approved by the government, and 2. Which are in force over a certain territory, and 3. Which must be obeyed by all persons on that territory? Violation of these rules could lead to government action such as imprisonment or fine or an order to pay compensation. Cyber law encompasses laws relating to: 1. Cyber Crimes
30
TRADEMARK
2. Electronic and Digital Signatures 3. Intellectual Property 4. Data Protection and Privacy Cyber crimes are unlawful acts where the computer is used either as a tool or a target or both. The enormous growth in electronic commerce (e-commerce) and online share trading has led to a phenomenal spurt in incidents of cyber crime. These crimes are discussed in detail further in this chapter.. Intellectual property is refers to creations of the human mind e.g. a story, a song, a painting, a design etc. The facets of intellectual property that relate to cyber space are covered by cyber law. All rights are reserved.These include: Copyright law in relation to computer software, computer source code, websites, cell phone content etc. Software and source code licenses. Trademark law with relation to domain names, meta tags, mirroring, framing, linking etc. Semiconductor law which relates to the protection of semiconductor integrated circuits design and layouts, Patent law in relation to computer hardware and software. Data protection and privacy laws aim to achieve a fair balance between the privacy rights of the individual and the interests of data controllers such as banks, hospitals, email service providers etc. These laws seek to address the challenges to privacy caused by collecting, storing and transmitting data using new technologies. 6.1.3 Need Of Cyber Laws There are various reasons why it is extremely difficult for conventional law to cope with cyberspace. Some of these are discussed below. 1. Cyberspace is an intangible dimension that is impossible to govern and regulate using conventional law. 2. Cyberspace has complete disrespect for jurisdictional boundaries. A person in India could break into a banks electronic vault hosted on a computer in USA and transfer millions of Rupees to another bank in Switzerland, all within minutes. All he would need is a laptop computer and a cell phone. 3. Cyberspace handles gigantic traffic volumes every second. Billions of emails are crisscrossing the globe even as we read this, millions of websites are being accessed every minute and billions of dollars are electronically transferred around the world by banks every day. 4. Cyberspace is absolutely open to participation by all. Ten year-old in Bhutan can have a live chat session with an eight year-old in Bali without any regard for the distance or the anonymity between them.
31
TRADEMARK
6. Cyberspace offers enormous potential for anonymity to its members. Readily available encryption software and steganographic tools that seamlessly hide information within image and sound files ensure the confidentiality of information exchanged between cyber-citizens. 6. Cyberspace offers never-seen-before economic efficiency. Billions of dollars worth of software can be traded over the Internet without the need for any government licenses, shipping and handling charges and without paying any customs duty. 7. Electronic information has become the main object of cyber crime. It is characterized by extreme mobility, which exceeds by far the mobility of persons, goods or other services. International computer networks can transfer huge amounts of data around the globe in a matter of seconds. 8. A software source code worth crores of rupees or a movie can be pirated across the globe within hours of their release. 9. Theft of corporeal information (e.g. books, papers, CD ROMs, floppy disks) is easily covered by traditional penal provisions. However, the problem begins when electronic records are copied quickly, inconspicuously and often via telecommunication facilities. Here the original information, so to say, remains in the possession of the owner and yet information getsstolen.
32
TRADEMARK
Chapter- 7
7.1 COMPUTER
According to one of the section of the IT Act "computer" means any electronic magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software, or communication facilities which are connected or related to the computer in a computer system or computer network. A computer has the following characteristics: 1. It is a high-speed data processing device or system. 2. It may be electronic, magnetic, optical etc. 3. It performs logical, arithmetic, and memory functions 4. These functions are performed by manipulations of electronic, magnetic or optical impulses. Computer includes: 1. All input facilities, 2. All output facilities, 3. All processing facilities, 4. All storage facilities, 7. All computer software facilities, and 7. All communication facilities which are connected or related to the computer in a computer system or network. Development of this technology is still in a nascent stage. Optical data processing can perform several operations simultaneously (in parallel) much faster and easier than electronics. Optical fiber is the medium and the technology associated with the transmission of information as light pulses along a glass or plastic wire or fiber. Optical fiber carries much more information than conventional copper wire and is in general not subject to electromagnetic interference. A data processing device or system is a mechanism that can perform pre defined operations upon information. The following are illustrations of functions in relation to a conventional desktop personal computer. saving information on a hard disk,
33
TRADEMARK Logging on to the Internet, retrieving stored information, calculating mathematical formulae. Logical functions, simply put, refer to non arithmetic processing that arranges numbers or letters according to a predefined format e.g. arranging numbers in ascending order, arranging words alphabetically etc. Arithmetic functions, simply put, are operations concerned or involved with mathematics and the addition, subtraction, multiplication and division of numbers. Memory functions, simply put, refer to operations involving storage of data. Fundamentals of Cyber Law Input facilities are those which transfer information from the outside world into a computer system. E.g. keyboard, mouse, touch screen, joystick, microphone, scanner etc. Output facilities are those which transfer data out of the computer in the form of text, images, sounds etc to a display screen, printer, storage device etc. Hard disks, USB disks, floppies act as both input and output facilities. Processing facilities primarily refers to the Central Processing Unit (CPU) of a computer. Referred to as the brain of the computer, the CPU processes instructions and data. Storage facilities include hard disks and other data storage facilities. This term would also include the physical cabinet in which a computer is housed. Computer software facilities refer to the operating system and application software that are essential for a computer to function in a useful manner. Communication facilities include the network interface cards, modems and other devices that enable a computer to communicate with other computers. Illustrations Considering the wide definition given to the term computer by the IT Act the following are examples of computers: Desktop personal computers Mobile phones Microwave ovens Computer printers Scanners installed computer software Automatic Teller Machine (ATM) smart homes which can be controlled through the Internet Fundamentals of Cyber Law Relevant Case Law In an interesting case, the Karnataka High Court laid down that ATMs are not computers, but are electronic devices under the Karnataka Sales Tax Act, 1977. Diebold Systems Pvt Ltd
34
TRADEMARK
manufacturer and supplier of Automated Teller Machines (ATM)] had sought a clarification from the Advance Ruling Authority (ARA) in Karnataka on the rate of tax applicable under the Karnataka Sales Tax Act, 1977 on sale of ATMs.
7.2 DATA
According to one of the section of the IT Act data means a representation of information, knowledge, facts, concepts or instructions which are being prepared or have been prepared in a formalized manner, and is intended to be processed, is being processed or has been processed in a computer system or computer network, and may be in any form (including computer printouts magnetic or optical storage media, punched cards, punched tapes) or stored internally in the memory of the computer. Simply put, data is 1. A representation of information, knowledge, facts, concepts or Instructions, 2. Prepared or being prepared in a formalized manner. 3. Processed. being processed or sought to be processed in a computer. Illustration Sanya is typing a document on her computer. The moment she presses keys on her keyboard, the corresponding alphabets are shown on her screen. But in the background some parts of the document are stored in the RAM of her computer (being processed) while other parts are stored on the hard disk (processed). At any given instant some information would be passing from her keyboard to the computer (sought to be processed). Data can be in many forms such as 1. Computer printouts, 2. Magnetic storage media e.g. hard disks, 3. Optical storage media e.g. CD ROMs, DVDs, VCDs 4. punched cards or tapes i.e. a paper card in which holes is punched. Illustration The electronic version of this book stored on your computer or on a CD would be data. A printout of the electronic version of this book will also be data.
TRADEMARK
Sanya downloads the OpenOffice software from the Internet. In effect what she downloads is an executable file. She double-clicks on the executable file and begins to install the software on her computer. During the installation she specifies the part (drive and folder name etc) of the hard disk where the software files must be saved. Computer software can be divided into two fundamental categories 1. Application software uses the computer directly for performing user tasks. 2. System software enables the application software to use the computers capabilities. System software can be of various types such as: 1. Operating systems which form the platform for all other software on a computer, 2. Device drivers which allow computer programs to interact with a hardware devices such as printers, scanners etc, 3. Programming tools which help programmers to develop and test other programs, 4. Compilers which compile the source code into the object code, 7. Linkers which link object code files (and libraries) to generate an executable file, 7. Utility software that helps manage and tune the computer hardware, operating system or application software. Application software include 1. Word processors (e.g. Microsoft Word), 2. Spreadsheets (e.g. Microsoft Excel) 3. Presentation software (e.g. Microsoft PowerPoint) 4. Media players (e.g. Microsoft Windows Media Player) 7. Games (e.g. Need for Speed, Age of Empires) 7. Forensic software (e.g. Win hex, X-Ways Forensics) 7. Encryption software (e.g. PGP) 8. Internet browsers (e.g. Mozilla Firefox)
TRADEMARK
Illustrations: Laptop computers Cell phones Sophisticated laser printers Hi-end scanners The American courts have held that the Internet falls under the definition of computer system and the use of email is accessing a computer.
37
TRADEMARK
Chapter- 8
38
TRADEMARK
learned when it attempted to prosecute the perpetrator of the May 2000 Love Bug virus, which caused billions of dollars of damage worldwide.
TRADEMARK
data-related crimes, including interception, modification, and theft. network-related crimes, including interference and sabotage. crimes of access, including hacking and virus distribution. and associated computer-related crimes, including aiding and abetting cyber criminals, computer fraud, and computer forgery. Thirty-three of the countries surveyed have not yet updated their laws to address any type of cyber crime. Of the remaining countries, nine have enacted legislation to address five or fewer types of cyber crime, and ten have updated their laws to prosecute against six or more of the ten types of cyber crime. Figure 1 provides a categorization of the 52 countries surveyed.
Fig. 8.1: Extent of Progress on Updating Cyber Crime Laws Figure 2 details which laws have been updated in each of the 19 countries with fully, substantially, or partially updated laws in place. In Canada, successful prosecutions of computerrelated fraud have effectively updated the law. Canada also provides an example of a phenomenon in many countriesthat law enforcement officials have strong confidence that existing laws provide sufficient coverage against the computer-related crimes of aiding and abetting cyber crimes, and computer-related fraud and forgery. Even among these countries, crimes are not treated uniformly. In some, unauthorized access is a crime only if harmful intent is present. in others, data theft is a crime only if the data relates specifically to an individuals religion or health, or if the intent is to defraud. Laws tend to be biased in favor of protecting public sector computers. Many of the laws reviewed in preparing Figure 2 outlaw crimes committed with or against government computers, but do not provide reciprocal protection to private sector computers.
40
TRADEMARK
Discrepancies exist even within countries. For example, in September 2000, the Australian Democratic Party criticized the South Australian (state) government for creating a haven for cyber criminals by not having updated its laws to combat computer-based crime in accordance with the laws of Australias other states. Moreover, as Figure 2 shows, there is little uniformity across nations in terms of which types of crimes have been addressed through updated statutes. The penalties provided in updated criminal statutes vary widely. Mauritius, the Philippines, and the United States have stronger penalties than many other countries for convictions of covered cyber crimes.
Key for Table 8.1 Data Interception: Interception of data in transmission. Data Modification: Alteration, destruction, or erasing of data. Data Theft: Taking or copying data, regardless of whether it is protected by other laws, e.g., copyright, privacy, etc. Network Interference: Impeding or preventing access for others. The most common example of this action is instigating a distributed denial of service (DDOS) attack, flooding Web sites or Internet Service Providers. DDOS attacks are often launched from numerous computers that have been hacked to obey commands of the perpetrator. Network Sabotage: Modification or destruction of a network or system. Unauthorized Access: Hacking or cracking to gain access to a system or data. Virus Dissemination: Introduction of software damaging to systems or data. Aiding and Abetting: Enabling the commission of a cyber crime. Computer-Related Forgery: Alteration of data with intent to represent as authentic. Computer-Related Fraud: Alteration of data with intent to derive economic benefit from its misrepresentation.
41
TRADEMARK
Kazakhstan State bodies in Kazakhstan are currently developing a law regarding cyber offences. Also in development is a special state program on the protection of information resources, including technical and software protection. Latvia* Amendments to the Criminal Code have been drafted envisaging considerable punishment for computer-related criminal acts. Corresponding additions would be made to the Administrative Offence Code. Lesotho Lesotho has established special interest groups to look at the various aspects of information security relating to e-commerce. Malta* In May 2000, Malta announced its goal of providing a strong legal framework for ecommerce, data protection, and computer misuse. The relevant Bills to develop a legislative framework for information practices were published in September 2000 and will be discussed in parliament in the coming months. Morocco In Morocco, there is an inter-ministerial commission sponsored by the Prime Minister working on security issues. New Zealand* At present there are no general computer crime offences in New Zealand. However, the country is currently drafting a Crimes Amendment Bill (No. 5). Sudan The Sudan intends to invite lawyers, legislators and computer professionals to a workshop where ideas on the nature of computer crimes and the ways of dealing with them by means of the appropriate legal codes will be exchanged. Vietnam Vietnam is in the process of gathering information to make proposals for amendments to its laws.
42
TRADEMARK
Chapter-9
CONCLUSION
Capacity of human mind is unfathomable. It is not possible to eliminate cyber crime from the cyber space. It is quite possible to check them. History is the witness that no legislation has succeeded in totally eliminating crime from the globe. The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime. Undoubtedly the Act is a historical step in the cyber world. Further I all together do not deny that there is a need to bring changes in the Information Technology Act to make it more effective to combat cyber crime. I would conclude with a word of caution for the pro-legislation school that it should be kept in mind that the provisions of the cyber law are not made so stringent that it may retard the growth of the industry and prove to be counter-productive.
43
TRADEMARK
Chapter-8
REFERENCES
References
The New Lexicon Webster's Encyclopedic Dictionary of the English Language. New York: Lexicon. Y. Rekhter, R. Moskowitz, D. Karrenberg, G. de Groot, E. Lear, ``Address Allocation for Private Internets.'' RFC 1918. J.P. Holbrook, J.K. Reynolds. ``Site Security Handbook.'' RFC 1244. Curtin, ``Snake Oil Warning Signs: Encryption Software to Avoid.'' USENET <sci.crypt> Frequently Asked Questions File.
3 4
44