Protection of Intellectual Property Research Paper

Pages: 4 (1299 words)  ·  Bibliography Sources: 4  ·  File: .docx  ·  Level: Master's  ·  Topic: Information Technology

These security measures include the inclusion of digital certificates in the software, which must be verified as genuine by the user before installation or use. There is also the use of unique codes and keys that are only present in the supply of the software. This code is present in the physical packaging thus; it is unique for each software. This makes use of the software to be limited to only one user. There is use of encryption and codes language that only the owner of the software can modify. This makes the theft of the programming language or code to make other similar software impossible.

The business shall also provide open access software and trial versions to be used by the general public, and ensure that they get to use the software and be encouraged to purchase the original software to enjoy the full capabilities. To fight off foreign entities the business shall outsource the design of the software to other software manufacturers at a cost; hence work collaboratively with them to discourage theft (NW3C, 2010).

Question 4.

Buy full Download Microsoft Word File paper
for $19.77
In light of increased intellectual property theft, the United States department of justice has prosecuted a number of cases related to the same. On April 3, 2012, Jeffery J. Reichert was convicted of manufacturing modification chips to be sold for financial gain to the public. These chips are designed to circumvent the technological measures programmed to restrict access to copyrighted software. The software affected in this case was the video game software such as Nintendo wii, in which the person could skip the security measures and use a pirated or unregistered version of the software.

Research Paper on Protection of Intellectual Property Intellectual Assignment

The impact of this theft means that users could buy just one copy of the software and distribute it to others to use as the original version. This would have brought about massive revenue losses to the Software Company, and cause a cease in operations. For the company to protect itself from future losses, they need to use more encrypted codes in the software, to protect it from future attacks of the same magnitude. They also need to restrict access to their servers and instead of using networks; they should store their work remotely to restrict access.

According to the current laws in effect, the punishment for intellectual property theft is too lenient. This is because the amount of loss of revenue and theft cannot be justified by a prison sentence of a couple of months while the company has lost millions of dollars. The loss of an intellectual proprietary is not only financially bad but also affects the psychological and future innovative ideas by the owner. This means that one would feel dejected and, as a result, be reluctant to create more innovative ideas for fear of theft (Qiu & Yu, 2010).

The fight against intellectual property theft needs to be stepped up by all government agencies in the United States. The government in that effect has launched a new strategy to fight this menace, and in the long run all intellectual works by a person will be recognized and secure.


Johnson, C and Walworth, D.J (March 2003). Protecting U.S. intellectual property rights and challenges to digital piracy. Office of industry working paper: U.S. international trade commission. Retrieved from

NW3C, (September, 2010). Intellectual property theft. National white collar crime center. Retrieved from

Qui D.L & Yu H, (2010). Does the protection of foreign intellectual property rights stimulate innovation in the U.S. Review of international economics, 18(5). Retrieved from

Setec. Investigating intellectual property theft. Retrieved from [END OF PREVIEW] . . . READ MORE

Two Ordering Options:

Which Option Should I Choose?
1.  Buy full paper (4 pages)Download Microsoft Word File

Download the perfectly formatted MS Word file!

- or -

2.  Write a NEW paper for me!✍🏻

We'll follow your exact instructions!
Chat with the writer 24/7.

Intellectual Property in Cyberspace Research Paper

Intellectual Property Report Term Paper

Intellectual Property Rights Term Paper

Intellectual Property Term Paper

Pharmaceutical Companies Intellectual Property and the Global AIDS Epidemic Research Paper

View 200+ other related papers  >>

How to Cite "Protection of Intellectual Property" Research Paper in a Bibliography:

APA Style

Protection of Intellectual Property.  (2013, April 18).  Retrieved May 25, 2020, from

MLA Format

"Protection of Intellectual Property."  18 April 2013.  Web.  25 May 2020. <>.

Chicago Style

"Protection of Intellectual Property."  April 18, 2013.  Accessed May 25, 2020.