Research Paper: Protection of Intellectual Property

Pages: 4 (1299 words)  ·  Bibliography Sources: 4  ·  Level: Master's  ·  Topic: Information Technology  ·  Buy This Paper

SAMPLE EXCERPT:

[. . .] These security measures include the inclusion of digital certificates in the software, which must be verified as genuine by the user before installation or use. There is also the use of unique codes and keys that are only present in the supply of the software. This code is present in the physical packaging thus; it is unique for each software. This makes use of the software to be limited to only one user. There is use of encryption and codes language that only the owner of the software can modify. This makes the theft of the programming language or code to make other similar software impossible.

The business shall also provide open access software and trial versions to be used by the general public, and ensure that they get to use the software and be encouraged to purchase the original software to enjoy the full capabilities. To fight off foreign entities the business shall outsource the design of the software to other software manufacturers at a cost; hence work collaboratively with them to discourage theft (NW3C, 2010).

Question 4.

In light of increased intellectual property theft, the United States department of justice has prosecuted a number of cases related to the same. On April 3, 2012, Jeffery J. Reichert was convicted of manufacturing modification chips to be sold for financial gain to the public. These chips are designed to circumvent the technological measures programmed to restrict access to copyrighted software. The software affected in this case was the video game software such as Nintendo wii, in which the person could skip the security measures and use a pirated or unregistered version of the software.

The impact of this theft means that users could buy just one copy of the software and distribute it to others to use as the original version. This would have brought about massive revenue losses to the Software Company, and cause a cease in operations. For the company to protect itself from future losses, they need to use more encrypted codes in the software, to protect it from future attacks of the same magnitude. They also need to restrict access to their servers and instead of using networks; they should store their work remotely to restrict access.

According to the current laws in effect, the punishment for intellectual property theft is too lenient. This is because the amount of loss of revenue and theft cannot be justified by a prison sentence of a couple of months while the company has lost millions of dollars. The loss of an intellectual proprietary is not only financially bad but also affects the psychological and future innovative ideas by the owner. This means that one would feel dejected and, as a result, be reluctant to create more innovative ideas for fear of theft (Qiu & Yu, 2010).

The fight against intellectual property theft needs to be stepped up by all government agencies in the United States. The government in that effect has launched a new strategy to fight this menace, and in the long run all intellectual works by a person will be recognized and secure.

References

Johnson, C and Walworth, D.J (March 2003). Protecting U.S. intellectual property rights and challenges to digital piracy. Office of industry working paper: U.S. international trade commission. Retrieved from http://www.usitc.gov/publications/332/working_papers/wp_id_05.pdf

NW3C, (September, 2010). Intellectual property theft. National white collar crime center. Retrieved from http://www.nw3c.org/docs/whitepapers/intellectual_property_theft_september_201008B6297ECEB4FAE7EAA79494.pdf?sfvrsn=3

Qui D.L & Yu H, (2010). Does the protection of foreign intellectual property rights stimulate innovation in the U.S. Review of international economics, 18(5). Retrieved from http://infojustice.org/download/gcongress/dii/Qui%20article.pdf

Setec. Investigating intellectual property theft. www.Setecinvestigations.com. Retrieved from http://www.setecinvestigations.com/resources/whitepapers/Investigating_Intellectual_Property_Theft.pdf [END OF PREVIEW]

Intellectual Property in Cyberspace Research Paper


Intellectual Property Report Term Paper


Intellectual Property Rights Term Paper


Intellectual Property Term Paper


Pharmaceutical Companies Intellectual Property and the Global AIDS Epidemic Research Paper


View 543 other related papers  >>

Cite This Research Paper:

APA Format

Protection of Intellectual Property.  (2013, April 18).  Retrieved November 13, 2019, from https://www.essaytown.com/subjects/paper/protection-intellectual-property/9787767

MLA Format

"Protection of Intellectual Property."  18 April 2013.  Web.  13 November 2019. <https://www.essaytown.com/subjects/paper/protection-intellectual-property/9787767>.

Chicago Format

"Protection of Intellectual Property."  Essaytown.com.  April 18, 2013.  Accessed November 13, 2019.
https://www.essaytown.com/subjects/paper/protection-intellectual-property/9787767.