Copyright & Internet

 

RIGHTS PROTECTED: 

Authors, musicians, and other creative have their copyrights protected by this statute. A right to copy is essentially what a copyright is. Copyright refers to the legal protections provided to authors and other producers of creative works. If someone has the copyright to anything, he is the only one who may own it and decide who may duplicate it since it is intellectual property. Although not all types of information are protected from copying by copyright, it offers a helpful set of legal protections for material on the Internet and in electronic bulletin board systems.

In the Internet Age, IPR Infringement is Simple: Electronic data replication is incredibly simple, and CD-ROM sharing networks are frequently used for music piracy. The court determined that receiving CDs in duplicate might constitute piracy and a breach of Section 14 of the Copyright Act, 1957 in the case of CIT v. Oracle Software India Ltd. Copying data from a source media to a destination medium with the same physical form is referred to as duplicating. In India, China, Brazil, Indonesia, and Pakistan, music piracy has reached unacceptably high levels, according to a new assessment by the Indian Federation of Phonographic Industry (IFPI).

Protecting Copyright within the E-WORLD:

• Online works that take the form of music, literature, or graphics are converted into binary numbers (0s or 1s). Computers process and store the electrical works as bits and bytes. Language that computers can understand is created from the human-readable material. The phrase "digital representation of the work" might refer to a copy of the original. Because of this, the Copyright Law has changed when applied to or interpreted in relation to computers and the internet.

• Use Definition in It Age, the writers have sole ownership of their works for a specific period of time, with the exception of the right to utilize the works for fair use. The copyrighted work enters the public domain when the protection period is up, and the author's rights are then nullified. Fair use is defined differently in different jurisdictions.

COPYRIGHT ISSUES ON THE INTERNET:

DOWNLOADING AND UPLOADING: Downloading entails creating an exact duplicate of the copied file. It is wise to confirm whether downloading files or programmes from a website is permitted and whether there are any limitations on commercial use. Uploading is the process of delivering data from a personal computer or mobile device to a server on another system so that it may be stored remotely. Users can upload their films to YouTube or their photographs to Picasa's server, for example.

• CACHING: At the user's end, "caching" refers to a temporary copy created by the RAM, and "proxy caching" takes place at the server's end. The idea of caching is an exception to both fair dealing and copyright infringement. A client's browser software contains a client cache that is kept there. It will come in two varieties: persistent cache and non-persistent cache.

MP3 REVOLUTION - (DERIVATIVE WORKS) MPEG audio layer 3 is known as MP3. It's a compressed audio file that degrades after a certain amount of compression. Many businesses, including Napster, permit peer-to-peer (P2P) file sharing of digital music that is copyright protected. For online copyright infringement, Napster was the target of legal action.

COPYRIGHT (AMENDMENT) ACT, 2012: The Copyright (Amendment) Act of 2012 amended the Copyright Act of 1957 by adding Section 65A, which offers protection for technical innovations. In accordance with Section 65A, a person who intentionally violates the rights granted by the act by disabling an effective technical device put in place to preserve such rights is penalised by up to two years in jail and a fine. Some acts that constitute exceptions to Section 65A are listed in Section 65A (2). (1). Any conduct in Section 65A (1) that isn't specifically banned by the Copyright Act of 1957 is excluded in Section 65 (2) if a complete record of the person is kept to identify him and the reason for which he was assisted (a).

 As an exemption under Section 65A (2), any action taken to perform encryption research using legally encrypted copy is permissible (B). Also permitted under Section 65A (2) is the conduct of any legitimate investigation (c). With the owner's consent (per Section 65A (1)(D)), the operator's consent (per Section 65A (1)(E)), or with the need to get around technological measures intended for user identification or surveillance (per Section 65A (1)(f)), it is permissible to take any action necessary to test the security of a computer system or a computer network.

Information on rights management is covered by Section 65B. Any person who distributes, imports for distribution, broadcasts, or communicates to the general public copies of any work or performance without authorization and knows that electronic rights management information has been removed or altered without authorization is punishable by up to two years in prison and may also be subject to a fine.

CONCLUSION:

The expansion of e-commerce on the internet is significantly influenced by the protection of intellectual property. A person employing his or her knowledge, talent, and Judgement to produce a physical or intangible object that has particular value in society is said to have engaged in the exercise of intellectual property rights, which are a range of exclusive rights granted by the state to an individual or institution.

To stop IP infringements, effective legal implementation is required. In order to prevent cybersquatting, corporate entities should establish, manage, and defend their intellectual property, including registering their domain names that contain their trademarks. To stop IP infringements in cyberspace, the use of electronic evidence should be promoted.

Apr 21, 2023

How Can We Help You?