scholarly journals Features of Intellectual Property Rights Management as Part of the Business Strategy of the Company. Trademark Licensing

2021 ◽  
Vol 27 (3) ◽  
pp. 84-100

The owner’s property right of material objects like products, which are part of а company’s portfolio, usually transfers to another individual in the process of their commercialization and more specifically in their purchase and sale. Тhings are not the same when we talk about owner’s rights of Intellectual property. Due to the non-material form of the objects, which are part of the system of Intellectual property, for example trademark, owners can keep their property right of trademark although it is commercialized. This is possible through the opportunity for licensing. In short, the owners provide their right of Intellectual property to a third party under mutually agreed terms. In return, the third party makes different forms of payments. Do we know how to take the maximum of this opportunity and more specifically when we talk about trademark licensing which is a part of our business strategy? The purpose of this publication is to give answers to some fundamental questions.

Author(s):  
Sergey Butakov ◽  
Vadim Dyagilev ◽  
Alexander Tskhay

<p class="AbstractText">Learning management systems (LMS) play a central role in communications in online and distance education. In the digital era, with all the information now accessible at students’ fingertips, plagiarism detection services (PDS) have become a must-have part of LMS. Such integration provides a seamless experience for users, allowing PDS to check submitted digital artifacts without any noticeable effort by either professor or student. In most such systems, to compare a submitted work with possible sources on the Internet, the university transfers the student’s submission to a third-party service. Such an approach is often criticized by students, who regard this process as a violation of copyright law. To address this issue, this paper outlines an improved approach for PDS development that should allow universities to avoid such criticism. The major proposed alteration of the mainstream architecture is to move document preprocessing and search result clarification from the third-party system back to the university system. The proposed architecture changes would allow schools to submit only limited information to the third party and avoid criticism about intellectual property violation. <br /><br /></p>


2008 ◽  
Vol 5 (1) ◽  
Author(s):  
Ying Zhan

AbstractThis article addresses the Chinese legislation on patent protection for biotechnology. Section I presents a brief overview of China's intellectual property right protection regime for biotechnology; Section II describes the China's current patent legislation on biotechnology. Since April 2005, China has lunched the third amendment to its Patent Law. The related information of the third amendment to Chinese biotechnology patent policy is provided in the final section.


2014 ◽  
Vol 1 (2) ◽  
Author(s):  
Indra Rahmatullah

Abstract: Aspects of Consumers Protection toward Alternative and Traditional Medical Advertisement. Intellectual Property Rights (IPR) is one of the main factors for economic growth of one country. Basically, IPR is an exclusive right given by a country to creators, inventors or designers for their inventions. On its development, IPR aims not only to give legal protection from the third party but also to earn money or economic benefits by several ways; IPR can be sold, licensed, and as a collateral to get loan from the banks. Those happen because of the inability to value the real assets of IPR with IPR valuation.   Key words: IPR, collateral, and Valuation Abstrak: Aspek Perlindungan Konsumen Terhadap Iklan Pengobatan Alternatif dan Tradisional. Hak Kekayaan Intelekatual (HKI) telah terbukti merupakan salah satu hal yang utama bagi pertumbuhan ekonomi di suatu negara. Pada dasarnya HKI merupakan hak eksklusif yang diberikan negara kepada pencipta, penemu atau pendesain untuk hasil kreasi atau penemuannya. Seiring dengan perkembangan HKI di belahan dunia, HKI bukan lagi hanya bertujuan untuk memberikan perlindungan hukum saja dari pihak ketiga, tetapi juga aset HKI dapat menghasilkan uang atau keuntungan ekonomi melalui beberapa cara yaitu HKI dapat dijual, dilisensikan, termasuk dapat digunakan sebagai jaminan (collateral) untuk mendapatkan pinjaman di bank. Hal itu terjadi, mengingat belum adanya pengalaman dan kemampuan dalam menilai berapa nilai aset riil HKI dengan cara valuasi (valuation) HKI.   Kata Kunci: HKI, Collateral (jaminan), dan ValuasiDOI:10.15408/sjsbs.v1i2.1538


2020 ◽  
pp. 376-416
Author(s):  
Emma Lees

This chapter examines mortgages, which are fundamental to the functioning of modern land law. They are the means by which most people finance the acquisition of their property. However, mortgages are more than simply a commercial transaction between a lender and a homeowner. They are also a property right in themselves and this brings with it a wide variety of options for the lender in terms of recovering their security. They also pose huge risks for the borrower. The chapter then explains the nature of the mortgage right and considers what terms can and cannot form part of a mortgage agreement. It also details the formal requirements of mortgages in terms of their creation, and identifies problems in the creation of a mortgage and the effects of these, looking in particular at the issues caused by undue influence. Moreover, the chapter describes the rights and obligations of the borrower in a mortgage (mortgagor), as well as that of the lender (mortgagee). Finally, it reflects on the third party effects of a mortgage, priorities, and land registration.


2020 ◽  
pp. 331-375
Author(s):  
Emma Lees

This chapter examines mortgages, which are fundamental to the functioning of modern land law. They are the means by which most people finance the acquisition of their property. However, mortgages are more than simply a commercial transaction between a lender and a homeowner. They are also a property right in themselves and this brings with it a wide variety of options for the lender in terms of recovering their security. They also pose huge risks for the borrower. The chapter then explains the nature of the mortgage right and considers what terms can and cannot form part of a mortgage agreement. It also details the formal requirements of mortgages in terms of their creation, and identifies problems in the creation of a mortgage and the effects of these, looking in particular at the issues caused by undue influence. Moreover, the chapter describes the rights and obligations of the borrower in a mortgage (mortgagor), as well as that of the lender (mortgagee). Finally, it reflects on the third party effects of a mortgage, priorities, and land registration.


2019 ◽  
Vol 12 (1) ◽  
pp. 14
Author(s):  
Erich Kurniawan Widjaja ◽  
William Tandya Putra

Inventory as a fiduciary object has different law consequences towards bank as the fiduciary receiver and as the third party. This what made the researcher interested to conduct a research to investigate the property right characteristic of the inventory as a fiduciary object through statute approach and conceptual approach. This research has found that some property right characteristic do not stick with the inventory or supplies since its characteristic is not always the same. One of the intangible characteristic of the property right is “droit de suite” or the characteristic that follows wherever the fiduciary object be. The absence of property right characteristic of inventory fiduciary object cause the weakening of that property right which is known as relativering.


2014 ◽  
Author(s):  
Jaclyn M. Moloney ◽  
Chelsea A. Reid ◽  
Jody L. Davis ◽  
Jeni L. Burnette ◽  
Jeffrey D. Green

Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


Sign in / Sign up

Export Citation Format

Share Document