Intellectual Property Laws and Security Measures

1101 Words3 Pages

Everyday people are coming up with new created ideas, innovations, and inventions and there are people who would steal those for personal gain. The intellectual property law is to protect people’s ideas, innovations, and inventions to prevent people from stealing ideas and passing them as their own for a profit. According to Grama, (2011), the laws recognizes three types of intellectual property of patents, trademarks, and copyrights, (p. 265). Patents are used to protect inventions such as equipment, designs, processes and more. Trademarks protect the logos, symbols and other used by companies such as logos for Apple, Burger King, McDonalds and others. Copyrights protect books, art, movies, music, computer programs and over works. When watching movies, whether its DVD, VCR, or other, an FBI warning comes up with the copyright information of illegally violating copyrights can be punished by a fine and/or jail time. Violating patents and trademarks can also be punished by a fine and/or jail time, it is not limited to copyrights.
A policy will need to be developed and implement in order to help prevent potential intellectual property violations in the organization. According to Kim & Solomon (2012), a policy is written statement from upper management to have a set course of action or direction which applies to the entire organization, (p. 40). When creating the policies to protect the organization, the policy will need identify who the policy applies to. The intellectual property laws are federal laws and apply to everyone working in the organization, managers and senior management are not except. Even if a company policy is not created, the federal laws created by the government applies to all the people living in the country. ...

... middle of paper ...

... be a lesson for all agencies and companies. Making illegal copies of movies and music will not be allowed and employees involved will be terminated and reported to the FBI. In order to prevent this from happening, burning software must be approved by management before installed or enabled on the computers.

Works Cited

Bass, D. (2010, Aug 26th). State employee kept pirated flicks, games on work computer. Retrieved from http://www.carolinajournal.com/exclusives/ display_exclusive.html?id=6786 Grama, A. (2011). Legal issues in information security. (p. 265).
Burlington, MA: Jones & Barlett Learning.

Kim, D. & Solomon, M. (2012). Fundamentals of information systems security. (p. 40).
Sudbury, MA: Jones & Bartlett Learning.
Reinholz, A. (n.d.). How to report copyright violations. Retrieved from http://www.ehow.com/how_6712667_report-copyright-violations.html

Open Document