scholarly journals Copyright and Patent Protection of Cloud Storage Software in the BRICS Member States

2021 ◽  
Vol 8 (4) ◽  
pp. 38-61
Author(s):  
A. Klishin ◽  
K. Taran

In the BRICS Member States, serious attention is paid to Information Technology development in terms of both technology and law. These countries are at the forefront in the development of the digital economy and digital innovations. Cloud storage software is an important element in this sector and is intensively applied in civil law transactions. The processes of approval, storage and sorting of documents are being automated on the basis of the relevant computer programs. This helps companies and government agencies to systemize their operations. At present, the most pressing issues are those related to copyright and copyright holders of computer programs since software code may be copied, even illegally or unconscientiously, and used as the basis for another software product. Cloud storage software is copyright-protected, but, depending on the scope of its use, additional patent protection may be required. Given the rapid development of the IT sector, a software product may be one of the components in an invention subject to patenting. The article focuses on the relationship between copyright and patent protection of software and offers a comparison of the approaches taken by the BRICS countries. Approaches taken by Germany as a European Union Member State and the United States of America are shown in the all-out comparison. The article also analyzes the views of academics on the relationship between copyright and patent protection of software.

Author(s):  
Erik Mathisen

The Civil War marked a turning point not only in the history of the republic, but the history of citizenship in the United States as well. But there is more to this moment than might appear on the surface. What this book stakes out are a new set of questions about what it meant to be a citizen, how Americans thought about it, and just how much the rapid development of two warring nation-states brought the relationship between citizens and states into such sharp relief. By placing ideas about obligation at the center of a history of citizenship during the Civil War era, The Loyal Republic charts new ground.


Author(s):  
José Álvarez-García ◽  
Amador Durán-Sánchez ◽  
María de la Cruz del Río-Rama ◽  
Ronny Correa-Quezada

While there is a progressive ageing of the population, we are witnessing a rapid development of new information and communication technologies (ICTs). Although for most of society this technology is within reach, there are population segments for whom access is limited, especially adults who are considered of old age. Due to the relevance that the relationship between ICTs and older adults acquires in today’s society, it is necessary to carry out an analysis of the scientific literature in order to understand the knowledge structure of this field. In this research, a comparative bibliometric analysis of 172 documents published in the Web of Science (WoS) and Scopus databases was carried out until 2018 and is complemented by a co-citation analysis. The results show that this subject is incipient and is in its exponential growth stage, with two thirds of the production concentrated in the 2012–2018 period. Four out of five authors are transient with a single authorship and the collaboration level is high. The most productive country is Germany followed by the United States and Australia.


2013 ◽  
Vol 433-435 ◽  
pp. 2313-2316
Author(s):  
Hua Liu ◽  
Yang Liu ◽  
Tian Xin

Building Information Modeling (BIM) is an innovative tool and Production Process,which is a typical application way of information technology in construction industry. The rapid development of BIM has brought about a gigantic revolution in construction industries of Europe and the United States and other developed countries. In China, only some big design institutes are or have been applying this technology.This paper concretely analyses the situation and the barrier of using BIM in China, expounds its application prospect in China based on the relationship between BIM technology and the related parties.


2019 ◽  
Vol 12 (1) ◽  
pp. 316
Author(s):  
Xiaowei Ma ◽  
Mei Wang ◽  
Chuandong Li

With the emergence of the contradictions between energy supply and demand, considerable attention has been paid to the residential household energy consumption with increasing research in this field. Based on databases of Science Citation Index Expanded and Social Sciences Citation Index, this paper applies the bibliometric method to analyze the development and evolution of this research field using the literature published in the field of residential energy consumption during the period 1970–2018. The following findings were found: (1) The research on energy consumption of households is mainly divided into three stages: cognition (1970–1989), exploration (1990–2005), and rapid development (2006–2018); (2) By analyzing the citations of high-yield authors, institutions, journals and papers in this field, it is clear that the developed countries such as the United States, Britain, and the Netherlands have significantly stronger research capabilities in this field; (3) By analyzing the co-occurrence of keywords and co-citation of the literature in this field, the research hotspots in this field are summarized as the relationship between energy supply and demand, energy use efficiency, the relationship between various household indicators and energy consumption, environmental protection, modeling and measurement; (4) In view of the reality, future works should pay more attention to the influence of micro-factors, regional energy consumption issues, and energy consumption of rural households.


2018 ◽  
Author(s):  
Andika carsya nafebra

Very rapid technological development, especially in the field of computers resulted in form legal protection not only through patent protection against hardware but also patents on computer programs. Developments in developed countries have a tendency to patent protection that reaches protection against the formulation of algorithms even programming languages as supporting parts of computer programs such as Extensible Markup Language (abbreviated as XML), while in Indonesia, computer programs themselves are not objects of patent protection. Based on this, the author conducted a research in the form of a thesis with the aim to determine whether Extensible markup language can be an object protected by a patent based on Law No. 14 of 2001 concerning Patents in Indonesia in the case of an XML Patent registered in the United States registered with number 5,787,449 which has just become a dispute in the court in the United States between i4i and Microsoft and how it impacts after a verdict has stated that there has been a violation of an XML patent in another country ... The method used in this research is analytical descriptive method with a normative legal approach. the research conducted was library research and supported by field research through interview instruments. A Programming Language such as Extensible Markup Language cannot be an object that is protected by a Patent Law in Indonesia, the only protection for XML is indirectly protected by Patents, namely through the Treaty of the SamaPaten based on Presidential Decree No. 16 of 1996 where patents can be registered for regional protection fellow WIPO member countries. The existence of a computer program with the extensible markup language feature that has violated patents in the United States in relation to Presidential Decree Number 16 of 1997 in Indonesia does not have executorial power as it applies state-limited patents, except that XML has been registered through PCT Patent protection against XML is possible. By considering priority rights which are limited to retroactive conditions when the patent registration is first registered at least in one other country outside Indonesia.


Author(s):  
Олена Штефан

Currently, the development of a modern economy is based on the rapid development of the latest achievements of science and technology, which in turn are the dominant indicators of state development. Globally, economic globalization and trade liberalization are accelerating, leading not only to the international division of labor, the expansion of markets and the corresponding increase in production, but also to an even greater intensification of competition, increasing the need for innovation and their sound legal protection. The principle (doctrine) of equivalence, which the courts apply in the event of patent disputes, is inextricably linked to these processes. The article reveals the essence and specifics of applying the principle of equivalents by studying the specialized literature and conducting comparative legal analysis of foreign jurisprudence.Despite the fact that the principle of equivalence has attracted the attention of many experts in the field of patent law, however, no criteria and approaches have been developed to put it into practice. An analysis of the literature indicates that researchers focus their attention on determining the principle of equivalence.As a result of the analysis of doctrinal approaches to determining the principle of equivalence, it is concluded that at the legislative level there is no differentiation of features (elements), but there is an indication of the identity of the feature as equivalent. Therefore, the substitution of the characteristic (element) indicated in the claims by the equivalent may be recognized as equivalent from the technical point of view and not from the legal position. Usually, the principle (doctrine) of equivalents is applied after the grant of the patent, and the possibility of assigning features (elements) to equivalents can be evaluated by the real technical means that appeared after the grant of the patent.The principle of equivalents or the doctrine of equivalents is a legal doctrine that was developed in the United States of America in 1850-1860 to counteract imitation, substitution of minor or minor components of a patented invention, while maintaining its other essential identity, to avoid liability.In Germany, the courts have widely used the principle of equivalents in interpreting the formula when dealing with patent infringement cases. In England, the doctrine of equivalents was not used, and the traditional British approach to determining the scope of protection was to interpret the claims literally. The analysis of the jurisprudence of foreign countries on the application of the principle of equivalence in the resolution of patent disputes allows us to draw the following conclusions: the application of the principle of equivalence in resolving the question of the scope of patent protection of inventions strikes a balance between the fair protection of the exclusive rights of the patentee and a certain variation of the elements of the claims by third parties, which will not infringe the patent rights of the patent owners; in determining the limits of patent protection by interpreting the claims, the German courts resort to the principle of equivalence when the claims contain ambiguous restrictions such as numerical ranges; in English courts, patent  infringement and patent jurisdiction issues are dealt with in a single trial, whereby judges' reasoning in the prior art has a greater influence on the understanding of the claims, in contrast to German courts that exclusively deal with patent infringement rights without touching on the aspects of the patent power.The analysis of the Ukrainian legislation has led to the conclusion that the understanding of the principle of equivalence coincides with a literal interpretation of the claims, while the new application of a known  product or process is not foreseen, since the scope of legal protection of such inventions is exhausted only by their formula, and equivalent features are not taken into account.


Author(s):  
Sebastian Harnisch

The Islamic Republic of Iran and the European Union (EU) have not yet established formal diplomatic relations, but since 1979 the Union and its member states have had various strong if often conflictual interactions. The relationship has been marked by distinct phases that reflect the emerging character of the partners, a theocratic republic on the one hand and a Union of interdependent democratic states on the other. While mutual economic interests have formed the basis for substantial interactions, relations with member states and the EU itself have been colored by a long and sometimes hurtful history of European states’ role in Iranian politics, including the Russian and British imperial influence over Persia in the late 19th and early 20th century, the British (and American) involvement in the coup against democratically elected Prime Minister Mohammad Mosaddeq in 1953, and the French hosting of Ayatollah Ruhollah Khomeini, an avowed critic of the Pahlavi dynasty, prior to the anti-authoritarian revolution in 1979. Over time, the relationship has substantially shaped the character and direction of the politics of the EU’s common foreign and security policy, resulting in more policy coherence between member states and the EU, more policy autonomy, particularly vis-á-vis the United States, and more proactive behavior, such as during the nuclear negotiations leading to the Joint Comprehensive Plan of Action (in 2015). By engaging with a problematic member of the nonproliferation treaty, the EU not only specified and thus strengthened the treaty, but it also grew into an international nonproliferation actor to reckon with.


2019 ◽  
Author(s):  
Angga Carya Nashara

Developments in developed countries have a tendency to patent protection that reaches protection against the formulation of algorithms even programming languages as supporting parts of computer programs such as Extensible Markup Language (abbreviated as XML), while in Indonesia, computer programs themselves are not objects of patent protection. Based on this, the author conducted a research in the form of a thesis with the aim to determine whether Extensible markup language can be an object protected by a patent based on Law No. 14 of 2001 concerning Patents in Indonesia in the case of an XML Patent registered in the United States registered with number 5,787,449 which has just become a dispute in the court in the United States between i4i and Microsoft and how it impacts after a verdict has stated that there has been a violation of an XML patent in another country ... The method used in this research is analytical descriptive method with a normative legal approach. the research conducted was library research and supported by field research through interview instruments. A Programming Language such as Extensible Markup Language cannot be an object that is protected by a Patent Law in Indonesia, the only protection for XML is indirectly protected by Patents, namely through the Treaty of the SamaPaten based on Presidential Decree No. 16 of 1996 where patents can be registered for regional protection fellow WIPO member countries. The existence of a computer program with the extensible markup language feature that has violated patents in the United States in relation to Presidential Decree Number 16 of 1997 in Indonesia does not have executorial power as it applies state-limited patents, except that XML has been registered through PCT Patent protection against XML is possible. By considering priority rights which are limited to retroactive conditions when the patent registration is first registered at least in one other country outside Indonesia.


2013 ◽  
Vol 9 (2) ◽  
Author(s):  
Aaron Henry

This article theorizes the relationship of privacy to capital and projects of security and, in doing so, situates privacy in context to pacification. In particular, the article provides an interrogation of the contradictory structuring of privacy as both an object threatened by security and the role of privacy as a means to resist or limit projects of security. Through an analysis of Thomas Hobbes’ writings, this contradictory dual-deployment of privacy is unseated to reveal that far from challenging security, privacy has historically been presupposed and structured by security projects. Moreover, by acclimatizing us to our existence as atomized individuals, alienated from our collective social power, privacy in fact pacifies us. This process is explored through an examination of the Passenger Flight List agreement (PNR) between the United States and EU member states. The article concludes with a brief discussion of the implications of our reliance on privacy has for challenging the logics of security and pacification, especially with the emergent technology of Drones.


2007 ◽  
Vol 12 (1) ◽  
pp. 54-61 ◽  
Author(s):  
Marisa L. Beeble ◽  
Deborah Bybee ◽  
Cris M. Sullivan

While research has found that millions of children in the United States are exposed to their mothers being battered, and that many are themselves abused as well, little is known about the ways in which children are used by abusers to manipulate or harm their mothers. Anecdotal evidence suggests that perpetrators use children in a variety of ways to control and harm women; however, no studies to date have empirically examined the extent of this occurring. Therefore, the current study examined the extent to which survivors of abuse experienced this, as well as the conditions under which it occurred. Interviews were conducted with 156 women who had experienced recent intimate partner violence. Each of these women had at least one child between the ages of 5 and 12. Most women (88%) reported that their assailants had used their children against them in varying ways. Multiple variables were found to be related to this occurring, including the relationship between the assailant and the children, the extent of physical and emotional abuse used by the abuser against the woman, and the assailant's court-ordered visitation status. Findings point toward the complex situational conditions by which assailants use the children of their partners or ex-partners to continue the abuse, and the need for a great deal more research in this area.


Sign in / Sign up

Export Citation Format

Share Document