SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
THEFT OF
       INTELLECTUAL
          PROPERTY




                Janine Hollesen


Follow this event on Twitter: #Cybercrime
DIGITAL AGE

Worldwide : 2 billion internet users
Worldwide : 294 billion emails and five billion
  sms’s daily
South Africa : end of 2011 = 8.5 million
Increase of 25% from 2010
7.9 million South Africans access internet from
  cell phones
New technologies : smart phones, tablets,
  flash drives increases the risk of theft and
  piracy
                           Follow this event on Twitter: #Cybercrime

                                                                       2
INTELLECTUAL PROPERTY

 Patents = invention used or applied in trade, industry,
  agriculture
 New product, process, device or improvement
 Territorial and registered right
 Trade mark = distinguishing goods and services
 Territorial and registered right
 Designs = appearance i.e. shape, configuration, pattern
  or ornamentation of an article manufactured in an
  industrial process
 Aesthetic vs Functional designs
 Territorial and registered rights
                                Follow this event on Twitter: #Cybercrime

                                                                            3
INTELLECTUAL PROPERTY
Copyright
Concerned with works as defined in the
  Copyright Act
No registration in SA
General legal requirements are met i.e.
  original and in a material form
Protection granted in other territories who are
  signatories to the Berne Convention
Literary works – anything that is written
  regardless of the literary quality thereof or the
  mode or form in which it is expressed
                           Follow this event on Twitter: #Cybercrime

                                                                       4
COPYRIGHT

 Musical works – music, excluding any words or actions
  intended to be sung, spoken or performed
 Artistic work – works of art including drawings,
  photographs, works of architecture and works of
  craftsmanship
 Cinematograph Film – fixation of material / data /
  signals capable of being seen as a moving picture
 Sound recording – fixation of sounds
 Computer programme – set of instructions which directs
  the operation of a computer



                                Follow this event on Twitter: #Cybercrime

                                                                            5
TRADE SECRETS / KNOW-HOW

Trade secrets / Know-how
Trade Secret - information which is not
  generally available and which gives the owner
  a competitive advantage
Know-how = similar to trade secrets
Body of knowledge, the components of which
  may be individually known, but the
  compilation has competitive value



                         Follow this event on Twitter: #Cybercrime

                                                                     6
WHAT CAN BE STOLEN?

Ideas / inventions / creative expressions
Products
Designs
Product specifications
Process information and methodologies
Chemical formula
Manufacturing process
Business method
                          Follow this event on Twitter: #Cybercrime

                                                                      7
WHAT CAN BE STOLEN?

 Supplier lists
 Parts specifications
 Quality assurance
 Testing procedures
 Research and development outputs
 Product prototypes
 Documents setting out business process methodologies
  and corporate strategies
 Business decision-making
 Staff details, including personal information, skill sets and
  remuneration levels
 Company capabilities and weaknesses
                                  Follow this event on Twitter: #Cybercrime

                                                                              8
Follow this event on Twitter: #Cybercrime

                                            9
TRADE SECRET / KNOW-HOW



Core business asset = company’s
  competitiveness to create market advantage
Must be kept a secret
Steps must be taken to ensure security of the
  information
Information should be marked “confidential”
Confidentiality / NDA agreements
Duration : For as long as secrecy is
  maintained
                         Follow this event on Twitter: #Cybercrime

                                                                     10
MEASURES




           Follow this event on Twitter: #Cybercrime

                                                       11
EXPLOITATION OF STOLEN IP?

Manufacturing the same product (only if no
  statutory IP protection)
Selling the IP - depend on whether the IP can
  be commercially exploited
Manufacturing a similar product utilising the
  underlying concept without the delay and R&D
  costs
Pre-empting a marketing initiative of a rival
Marketing of a product with the same trade
  mark prior to the launch of the rival’s product
                             Follow this event on Twitter: #Cybercrime

                                                                         12
EFFECT OF THEFT AND USE OF IP

Erosion of competitive advantage
Loss of sales
Reputational damage
Reduction in potential investment




                      Follow this event on Twitter: #Cybercrime

                                                                  13
EXAMPLES
 Former employee was convicted of exporting
  sensitive military technology to China
 Thousands of electronic files were stolen from
  employer which detailed the performance and
  design of guidance systems for missiles, rockets,
  target locators and unmanned aerial vehicles.
 The US spends billions of dollars annually on R&D
  which if used by a third party could result in rapid
  development of rival products without the
  significant cost
 Significant penalties and fines in the US
 SA – damages to be proved

                               Follow this event on Twitter: #Cybercrime

                                                                           14
EXAMPLES
 Pittsburgh Corning Corp : two people charged with
  trying to purchase trade secrets for $100,000 to
  open rival plant in China
 DuPont, US chemical company : 2 former
  employees and a third party conspired to steal
  trade secrets about a technology for Panang Group
  (one of China’s largest titanium pigment
  producers)
 DuPont has also filed a civil case
 DuPont : South Korea’s Industries hired ex-
  employees of DuPont to steal confidential
  information regarding a particular product. DuPont
  was awarded $1 billion in damages
                              Follow this event on Twitter: #Cybercrime

                                                                          15
CONCLUDING REMARKS
 The pervasiveness of digital platforms


 Increase in internet users


 Introduction of new technologies


 The speed with which information can be exchanged


 Contributory factors to assist in the age old crime of
  stealing, with the utilisation of sophisticated methods

                                Follow this event on Twitter: #Cybercrime

                                                                            16
THANK YOU
                           Janine Hollesen
                            11 October 2012

Nothing in this presentation should be construed as formal
     legal advice from any lawyer or this firm. Readers are
advised to consult professional legal advisors for guidance
          on legislation which may affect their businesses.


  © 2012 Werksmans Incorporated trading as Werksmans
                         Attorneys. All rights reserved.




     Follow this event on Twitter: #Cybercrime

Weitere ähnliche Inhalte

Was ist angesagt?

TM Infringement- Rajeev Mandal.
TM Infringement- Rajeev Mandal.TM Infringement- Rajeev Mandal.
TM Infringement- Rajeev Mandal.Rajiv Mandal
 
rights related to copyrights
rights related to copyrightsrights related to copyrights
rights related to copyrightsfariansari
 
Samsung Vs. Apple -- The Patent Fight
Samsung Vs. Apple -- The Patent FightSamsung Vs. Apple -- The Patent Fight
Samsung Vs. Apple -- The Patent FightKumar Sanidhya
 
Patent Infringement
Patent InfringementPatent Infringement
Patent InfringementHasit Seth
 
Nature and scope of protection of copyright
Nature and scope of protection of copyrightNature and scope of protection of copyright
Nature and scope of protection of copyrightVikash Kumar
 
Understanding trade secret protection in india
Understanding trade secret protection in indiaUnderstanding trade secret protection in india
Understanding trade secret protection in indiaAltacit Global
 
Introduction to Intellectual Property
Introduction to Intellectual PropertyIntroduction to Intellectual Property
Introduction to Intellectual PropertySaqib Raza
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspaceatuljaybhaye
 
Compulsory liscencing
Compulsory liscencingCompulsory liscencing
Compulsory liscencingvishnugm
 
Surrender and Revocation of Patents
Surrender and Revocation of PatentsSurrender and Revocation of Patents
Surrender and Revocation of PatentsDVSResearchFoundatio
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issuesatuljaybhaye
 
Compulsory licensing by surendra
Compulsory licensing by surendraCompulsory licensing by surendra
Compulsory licensing by surendraAnumulaSurendra
 
Intellectual Property Strategy
Intellectual Property StrategyIntellectual Property Strategy
Intellectual Property StrategyElijah Ezendu
 
Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)Mark Peralta
 

Was ist angesagt? (20)

TM Infringement- Rajeev Mandal.
TM Infringement- Rajeev Mandal.TM Infringement- Rajeev Mandal.
TM Infringement- Rajeev Mandal.
 
rights related to copyrights
rights related to copyrightsrights related to copyrights
rights related to copyrights
 
Samsung Vs. Apple -- The Patent Fight
Samsung Vs. Apple -- The Patent FightSamsung Vs. Apple -- The Patent Fight
Samsung Vs. Apple -- The Patent Fight
 
Trade Secret & Intellectual Property Rights
Trade Secret & Intellectual Property RightsTrade Secret & Intellectual Property Rights
Trade Secret & Intellectual Property Rights
 
Freedom to Operate
Freedom to OperateFreedom to Operate
Freedom to Operate
 
Patent Infringement
Patent InfringementPatent Infringement
Patent Infringement
 
Nature and scope of protection of copyright
Nature and scope of protection of copyrightNature and scope of protection of copyright
Nature and scope of protection of copyright
 
Understanding trade secret protection in india
Understanding trade secret protection in indiaUnderstanding trade secret protection in india
Understanding trade secret protection in india
 
Intellectual Property for Engineers
Intellectual Property for EngineersIntellectual Property for Engineers
Intellectual Property for Engineers
 
Introduction to Intellectual Property
Introduction to Intellectual PropertyIntroduction to Intellectual Property
Introduction to Intellectual Property
 
Design act 2000
Design act 2000Design act 2000
Design act 2000
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspace
 
Compulsory liscencing
Compulsory liscencingCompulsory liscencing
Compulsory liscencing
 
Copyright in india
Copyright in indiaCopyright in india
Copyright in india
 
Surrender and Revocation of Patents
Surrender and Revocation of PatentsSurrender and Revocation of Patents
Surrender and Revocation of Patents
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
Compulsory licensing by surendra
Compulsory licensing by surendraCompulsory licensing by surendra
Compulsory licensing by surendra
 
Intellectual Property Strategy
Intellectual Property StrategyIntellectual Property Strategy
Intellectual Property Strategy
 
Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)
 

Andere mochten auch

Intellectual theft
Intellectual theftIntellectual theft
Intellectual thefttinamac25
 
Arms Trafficking Lighting Round, Suchit Chavez #gijc15
Arms Trafficking Lighting Round, Suchit Chavez #gijc15Arms Trafficking Lighting Round, Suchit Chavez #gijc15
Arms Trafficking Lighting Round, Suchit Chavez #gijc15gijn
 
Drug Trafficking Show
Drug Trafficking ShowDrug Trafficking Show
Drug Trafficking ShowCobe2117
 
The fight against drug trafficking
The fight against drug traffickingThe fight against drug trafficking
The fight against drug traffickingAdriana Degetau
 
arms trafficking
arms traffickingarms trafficking
arms traffickingsanju249
 
Causes and effects of drug addiction
Causes and effects of drug addictionCauses and effects of drug addiction
Causes and effects of drug addictionparkerp134
 
8 GLOBALISATION of CRIME: Columbian Drugs Trade
8 GLOBALISATION of CRIME: Columbian Drugs Trade8 GLOBALISATION of CRIME: Columbian Drugs Trade
8 GLOBALISATION of CRIME: Columbian Drugs Trademattyp99
 
Drug trafficking: Causes & Consequences
Drug trafficking: Causes & ConsequencesDrug trafficking: Causes & Consequences
Drug trafficking: Causes & ConsequencesPriyanka S
 
Money laundering
Money launderingMoney laundering
Money launderingsaadiakh
 
Human Trafficking PowerPoint Presentation
Human Trafficking PowerPoint PresentationHuman Trafficking PowerPoint Presentation
Human Trafficking PowerPoint Presentationlbrowning9
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rightsharshhanu
 

Andere mochten auch (18)

Intellectual theft
Intellectual theftIntellectual theft
Intellectual theft
 
Arms Trafficking Lighting Round, Suchit Chavez #gijc15
Arms Trafficking Lighting Round, Suchit Chavez #gijc15Arms Trafficking Lighting Round, Suchit Chavez #gijc15
Arms Trafficking Lighting Round, Suchit Chavez #gijc15
 
Drug Trafficking:SSB 54
Drug Trafficking:SSB 54Drug Trafficking:SSB 54
Drug Trafficking:SSB 54
 
Drug trafficking
Drug traffickingDrug trafficking
Drug trafficking
 
Drug Trafficking Show
Drug Trafficking ShowDrug Trafficking Show
Drug Trafficking Show
 
The fight against drug trafficking
The fight against drug traffickingThe fight against drug trafficking
The fight against drug trafficking
 
Pássaro de Fogo
Pássaro de FogoPássaro de Fogo
Pássaro de Fogo
 
Drug trafficking
Drug traffickingDrug trafficking
Drug trafficking
 
arms trafficking
arms traffickingarms trafficking
arms trafficking
 
Causes and effects of drug addiction
Causes and effects of drug addictionCauses and effects of drug addiction
Causes and effects of drug addiction
 
8 GLOBALISATION of CRIME: Columbian Drugs Trade
8 GLOBALISATION of CRIME: Columbian Drugs Trade8 GLOBALISATION of CRIME: Columbian Drugs Trade
8 GLOBALISATION of CRIME: Columbian Drugs Trade
 
Drug trafficking
Drug traffickingDrug trafficking
Drug trafficking
 
Globalisation
GlobalisationGlobalisation
Globalisation
 
Drug trafficking: Causes & Consequences
Drug trafficking: Causes & ConsequencesDrug trafficking: Causes & Consequences
Drug trafficking: Causes & Consequences
 
Money laundering
Money launderingMoney laundering
Money laundering
 
Human Trafficking PowerPoint Presentation
Human Trafficking PowerPoint PresentationHuman Trafficking PowerPoint Presentation
Human Trafficking PowerPoint Presentation
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 

Ähnlich wie Understanding Cybercrime: Theft of Intellectual Property - Janine Hollesen

Bridging the Gap: Securing IP
Bridging the Gap: Securing IPBridging the Gap: Securing IP
Bridging the Gap: Securing IPipspat
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017Craig Devlin
 
Intellectual Property 101 for Start-Ups
Intellectual Property 101 for Start-UpsIntellectual Property 101 for Start-Ups
Intellectual Property 101 for Start-UpsJames Alexander
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Arpin Consulting
 
20070423_NYCLA_NYC_TechnologyLicensingTodayTradeSecretsTradeSecretLicensing1.ppt
20070423_NYCLA_NYC_TechnologyLicensingTodayTradeSecretsTradeSecretLicensing1.ppt20070423_NYCLA_NYC_TechnologyLicensingTodayTradeSecretsTradeSecretLicensing1.ppt
20070423_NYCLA_NYC_TechnologyLicensingTodayTradeSecretsTradeSecretLicensing1.pptMehdi Rahmani
 
Digital Healthcare - U.S. IP strategy
Digital Healthcare - U.S. IP strategyDigital Healthcare - U.S. IP strategy
Digital Healthcare - U.S. IP strategyKisuk Lee
 
IPR in Business #03: Developing Effective IP Strategy
IPR in Business #03: Developing Effective IP StrategyIPR in Business #03: Developing Effective IP Strategy
IPR in Business #03: Developing Effective IP StrategyOrigiin IP Solutions LLP
 
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...AIIM International
 
Inventor Boot Camp Thomas Franklin 10 17 2009
Inventor Boot Camp   Thomas Franklin   10 17 2009Inventor Boot Camp   Thomas Franklin   10 17 2009
Inventor Boot Camp Thomas Franklin 10 17 2009dr2tom
 
The Crucial Role of Intellectual Property for Startups.pdf
The Crucial Role of Intellectual Property for Startups.pdfThe Crucial Role of Intellectual Property for Startups.pdf
The Crucial Role of Intellectual Property for Startups.pdfMr. Business Magazine
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
Strategies for Protecting and Leveraging your IP
Strategies for Protecting and Leveraging your IPStrategies for Protecting and Leveraging your IP
Strategies for Protecting and Leveraging your IPLocus Research
 
Societal impacts PART 1
Societal impacts PART 1Societal impacts PART 1
Societal impacts PART 1AVISHITYAGI
 
Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Ray Bugg
 
Working With Underwriting To Define And Sell The Insurable Risk. Maureen Vete...
Working With Underwriting To Define And Sell The Insurable Risk. Maureen Vete...Working With Underwriting To Define And Sell The Insurable Risk. Maureen Vete...
Working With Underwriting To Define And Sell The Insurable Risk. Maureen Vete...MVeterano
 
Mba1034 cg law ethics week 10 intellectual property 2013
Mba1034 cg law ethics week 10 intellectual property  2013Mba1034 cg law ethics week 10 intellectual property  2013
Mba1034 cg law ethics week 10 intellectual property 2013Stephen Ong
 
Intellectaul property right
Intellectaul property rightIntellectaul property right
Intellectaul property rightkoach1787
 

Ähnlich wie Understanding Cybercrime: Theft of Intellectual Property - Janine Hollesen (20)

Bridging the Gap: Securing IP
Bridging the Gap: Securing IPBridging the Gap: Securing IP
Bridging the Gap: Securing IP
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 
Intellectual Property 101 for Start-Ups
Intellectual Property 101 for Start-UpsIntellectual Property 101 for Start-Ups
Intellectual Property 101 for Start-Ups
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
 
Drm
DrmDrm
Drm
 
20070423_NYCLA_NYC_TechnologyLicensingTodayTradeSecretsTradeSecretLicensing1.ppt
20070423_NYCLA_NYC_TechnologyLicensingTodayTradeSecretsTradeSecretLicensing1.ppt20070423_NYCLA_NYC_TechnologyLicensingTodayTradeSecretsTradeSecretLicensing1.ppt
20070423_NYCLA_NYC_TechnologyLicensingTodayTradeSecretsTradeSecretLicensing1.ppt
 
Digital Healthcare - U.S. IP strategy
Digital Healthcare - U.S. IP strategyDigital Healthcare - U.S. IP strategy
Digital Healthcare - U.S. IP strategy
 
IPR in Business #03: Developing Effective IP Strategy
IPR in Business #03: Developing Effective IP StrategyIPR in Business #03: Developing Effective IP Strategy
IPR in Business #03: Developing Effective IP Strategy
 
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
 
Inventor Boot Camp Thomas Franklin 10 17 2009
Inventor Boot Camp   Thomas Franklin   10 17 2009Inventor Boot Camp   Thomas Franklin   10 17 2009
Inventor Boot Camp Thomas Franklin 10 17 2009
 
The Crucial Role of Intellectual Property for Startups.pdf
The Crucial Role of Intellectual Property for Startups.pdfThe Crucial Role of Intellectual Property for Startups.pdf
The Crucial Role of Intellectual Property for Startups.pdf
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Strategies for Protecting and Leveraging your IP
Strategies for Protecting and Leveraging your IPStrategies for Protecting and Leveraging your IP
Strategies for Protecting and Leveraging your IP
 
Societal impacts PART 1
Societal impacts PART 1Societal impacts PART 1
Societal impacts PART 1
 
Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019
 
Working With Underwriting To Define And Sell The Insurable Risk. Maureen Vete...
Working With Underwriting To Define And Sell The Insurable Risk. Maureen Vete...Working With Underwriting To Define And Sell The Insurable Risk. Maureen Vete...
Working With Underwriting To Define And Sell The Insurable Risk. Maureen Vete...
 
Mba1034 cg law ethics week 10 intellectual property 2013
Mba1034 cg law ethics week 10 intellectual property  2013Mba1034 cg law ethics week 10 intellectual property  2013
Mba1034 cg law ethics week 10 intellectual property 2013
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Intellectaul property right
Intellectaul property rightIntellectaul property right
Intellectaul property right
 

Mehr von Werksmans Attorneys

Reaching the summit - addressing the land question seminar
Reaching the summit - addressing the land question seminar Reaching the summit - addressing the land question seminar
Reaching the summit - addressing the land question seminar Werksmans Attorneys
 
Developing sexuality and sexual health policies in the disability sector
Developing sexuality and sexual health policies in the disability sector Developing sexuality and sexual health policies in the disability sector
Developing sexuality and sexual health policies in the disability sector Werksmans Attorneys
 
Recent developments in mining legislation and case law: Director Chris Stevens
Recent developments in mining legislation and case law: Director Chris StevensRecent developments in mining legislation and case law: Director Chris Stevens
Recent developments in mining legislation and case law: Director Chris StevensWerksmans Attorneys
 
Business rescue: Saving distressed companies (Director Eric Levenstein and Se...
Business rescue: Saving distressed companies (Director Eric Levenstein and Se...Business rescue: Saving distressed companies (Director Eric Levenstein and Se...
Business rescue: Saving distressed companies (Director Eric Levenstein and Se...Werksmans Attorneys
 
Business rescue in mining: Peter van den Steen (VSquared)
Business rescue in mining: Peter van den Steen (VSquared)Business rescue in mining: Peter van den Steen (VSquared)
Business rescue in mining: Peter van den Steen (VSquared)Werksmans Attorneys
 
Environmental regulation of prospecting, exploration, mining and production: ...
Environmental regulation of prospecting, exploration, mining and production: ...Environmental regulation of prospecting, exploration, mining and production: ...
Environmental regulation of prospecting, exploration, mining and production: ...Werksmans Attorneys
 
CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...
CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...
CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...Werksmans Attorneys
 
TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:
TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:
TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:Werksmans Attorneys
 
WHEN GOOD CONSTRUCTION CONTRACTS GO BAD
WHEN GOOD CONSTRUCTION CONTRACTS GO BAD WHEN GOOD CONSTRUCTION CONTRACTS GO BAD
WHEN GOOD CONSTRUCTION CONTRACTS GO BAD Werksmans Attorneys
 
The Future of Section 197 in South Africa: Bradley Workman-Davies
The Future of Section 197 in South Africa: Bradley Workman-DaviesThe Future of Section 197 in South Africa: Bradley Workman-Davies
The Future of Section 197 in South Africa: Bradley Workman-DaviesWerksmans Attorneys
 
The Employment Equity Amendment Act: Anastasia Vatalidis
The Employment Equity Amendment Act: Anastasia VatalidisThe Employment Equity Amendment Act: Anastasia Vatalidis
The Employment Equity Amendment Act: Anastasia VatalidisWerksmans Attorneys
 
Controlling Strike Violence: Advocate Anton Myburgh SC
Controlling Strike Violence: Advocate Anton Myburgh SCControlling Strike Violence: Advocate Anton Myburgh SC
Controlling Strike Violence: Advocate Anton Myburgh SCWerksmans Attorneys
 
BBBEE Presentation Cape Town Seminar 29 August 2014
BBBEE Presentation Cape Town Seminar 29 August 2014BBBEE Presentation Cape Town Seminar 29 August 2014
BBBEE Presentation Cape Town Seminar 29 August 2014Werksmans Attorneys
 
VSquXred Business Rescue presentation
VSquXred Business Rescue presentation VSquXred Business Rescue presentation
VSquXred Business Rescue presentation Werksmans Attorneys
 
Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...Werksmans Attorneys
 
Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...Werksmans Attorneys
 
Healthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-Smidt
Healthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-SmidtHealthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-Smidt
Healthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-SmidtWerksmans Attorneys
 

Mehr von Werksmans Attorneys (20)

Labour employment seminar 2016
Labour  employment seminar 2016Labour  employment seminar 2016
Labour employment seminar 2016
 
Reaching the summit - addressing the land question seminar
Reaching the summit - addressing the land question seminar Reaching the summit - addressing the land question seminar
Reaching the summit - addressing the land question seminar
 
Collusive tendering
Collusive tenderingCollusive tendering
Collusive tendering
 
Jbcc - out with the old
Jbcc - out with the oldJbcc - out with the old
Jbcc - out with the old
 
Developing sexuality and sexual health policies in the disability sector
Developing sexuality and sexual health policies in the disability sector Developing sexuality and sexual health policies in the disability sector
Developing sexuality and sexual health policies in the disability sector
 
Recent developments in mining legislation and case law: Director Chris Stevens
Recent developments in mining legislation and case law: Director Chris StevensRecent developments in mining legislation and case law: Director Chris Stevens
Recent developments in mining legislation and case law: Director Chris Stevens
 
Business rescue: Saving distressed companies (Director Eric Levenstein and Se...
Business rescue: Saving distressed companies (Director Eric Levenstein and Se...Business rescue: Saving distressed companies (Director Eric Levenstein and Se...
Business rescue: Saving distressed companies (Director Eric Levenstein and Se...
 
Business rescue in mining: Peter van den Steen (VSquared)
Business rescue in mining: Peter van den Steen (VSquared)Business rescue in mining: Peter van den Steen (VSquared)
Business rescue in mining: Peter van den Steen (VSquared)
 
Environmental regulation of prospecting, exploration, mining and production: ...
Environmental regulation of prospecting, exploration, mining and production: ...Environmental regulation of prospecting, exploration, mining and production: ...
Environmental regulation of prospecting, exploration, mining and production: ...
 
CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...
CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...
CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...
 
TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:
TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:
TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:
 
WHEN GOOD CONSTRUCTION CONTRACTS GO BAD
WHEN GOOD CONSTRUCTION CONTRACTS GO BAD WHEN GOOD CONSTRUCTION CONTRACTS GO BAD
WHEN GOOD CONSTRUCTION CONTRACTS GO BAD
 
The Future of Section 197 in South Africa: Bradley Workman-Davies
The Future of Section 197 in South Africa: Bradley Workman-DaviesThe Future of Section 197 in South Africa: Bradley Workman-Davies
The Future of Section 197 in South Africa: Bradley Workman-Davies
 
The Employment Equity Amendment Act: Anastasia Vatalidis
The Employment Equity Amendment Act: Anastasia VatalidisThe Employment Equity Amendment Act: Anastasia Vatalidis
The Employment Equity Amendment Act: Anastasia Vatalidis
 
Controlling Strike Violence: Advocate Anton Myburgh SC
Controlling Strike Violence: Advocate Anton Myburgh SCControlling Strike Violence: Advocate Anton Myburgh SC
Controlling Strike Violence: Advocate Anton Myburgh SC
 
BBBEE Presentation Cape Town Seminar 29 August 2014
BBBEE Presentation Cape Town Seminar 29 August 2014BBBEE Presentation Cape Town Seminar 29 August 2014
BBBEE Presentation Cape Town Seminar 29 August 2014
 
VSquXred Business Rescue presentation
VSquXred Business Rescue presentation VSquXred Business Rescue presentation
VSquXred Business Rescue presentation
 
Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...
 
Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...
 
Healthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-Smidt
Healthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-SmidtHealthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-Smidt
Healthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-Smidt
 

Kürzlich hochgeladen

如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书Fi L
 
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkobhavenpr
 
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Pooja Nehwal
 
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreieGujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreiebhavenpr
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadershipanjanibaddipudi1
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
Vashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call GirlsVashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call GirlsPooja Nehwal
 
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Developmentnarsireddynannuri1
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhbhavenpr
 
30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)Delhi Call girls
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docxkfjstone13
 
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackVerified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackPsychicRuben LoveSpells
 
Julius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the TableJulius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the Tableget joys
 
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...Diya Sharma
 

Kürzlich hochgeladen (20)

如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
 
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
 
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
 
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
 
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreieGujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
 
Vashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call GirlsVashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call Girls
 
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
 
30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
 
29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
 
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackVerified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
 
Julius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the TableJulius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the Table
 
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
 

Understanding Cybercrime: Theft of Intellectual Property - Janine Hollesen

  • 1. THEFT OF INTELLECTUAL PROPERTY Janine Hollesen Follow this event on Twitter: #Cybercrime
  • 2. DIGITAL AGE Worldwide : 2 billion internet users Worldwide : 294 billion emails and five billion sms’s daily South Africa : end of 2011 = 8.5 million Increase of 25% from 2010 7.9 million South Africans access internet from cell phones New technologies : smart phones, tablets, flash drives increases the risk of theft and piracy Follow this event on Twitter: #Cybercrime 2
  • 3. INTELLECTUAL PROPERTY  Patents = invention used or applied in trade, industry, agriculture  New product, process, device or improvement  Territorial and registered right  Trade mark = distinguishing goods and services  Territorial and registered right  Designs = appearance i.e. shape, configuration, pattern or ornamentation of an article manufactured in an industrial process  Aesthetic vs Functional designs  Territorial and registered rights Follow this event on Twitter: #Cybercrime 3
  • 4. INTELLECTUAL PROPERTY Copyright Concerned with works as defined in the Copyright Act No registration in SA General legal requirements are met i.e. original and in a material form Protection granted in other territories who are signatories to the Berne Convention Literary works – anything that is written regardless of the literary quality thereof or the mode or form in which it is expressed Follow this event on Twitter: #Cybercrime 4
  • 5. COPYRIGHT  Musical works – music, excluding any words or actions intended to be sung, spoken or performed  Artistic work – works of art including drawings, photographs, works of architecture and works of craftsmanship  Cinematograph Film – fixation of material / data / signals capable of being seen as a moving picture  Sound recording – fixation of sounds  Computer programme – set of instructions which directs the operation of a computer Follow this event on Twitter: #Cybercrime 5
  • 6. TRADE SECRETS / KNOW-HOW Trade secrets / Know-how Trade Secret - information which is not generally available and which gives the owner a competitive advantage Know-how = similar to trade secrets Body of knowledge, the components of which may be individually known, but the compilation has competitive value Follow this event on Twitter: #Cybercrime 6
  • 7. WHAT CAN BE STOLEN? Ideas / inventions / creative expressions Products Designs Product specifications Process information and methodologies Chemical formula Manufacturing process Business method Follow this event on Twitter: #Cybercrime 7
  • 8. WHAT CAN BE STOLEN?  Supplier lists  Parts specifications  Quality assurance  Testing procedures  Research and development outputs  Product prototypes  Documents setting out business process methodologies and corporate strategies  Business decision-making  Staff details, including personal information, skill sets and remuneration levels  Company capabilities and weaknesses Follow this event on Twitter: #Cybercrime 8
  • 9. Follow this event on Twitter: #Cybercrime 9
  • 10. TRADE SECRET / KNOW-HOW Core business asset = company’s competitiveness to create market advantage Must be kept a secret Steps must be taken to ensure security of the information Information should be marked “confidential” Confidentiality / NDA agreements Duration : For as long as secrecy is maintained Follow this event on Twitter: #Cybercrime 10
  • 11. MEASURES Follow this event on Twitter: #Cybercrime 11
  • 12. EXPLOITATION OF STOLEN IP? Manufacturing the same product (only if no statutory IP protection) Selling the IP - depend on whether the IP can be commercially exploited Manufacturing a similar product utilising the underlying concept without the delay and R&D costs Pre-empting a marketing initiative of a rival Marketing of a product with the same trade mark prior to the launch of the rival’s product Follow this event on Twitter: #Cybercrime 12
  • 13. EFFECT OF THEFT AND USE OF IP Erosion of competitive advantage Loss of sales Reputational damage Reduction in potential investment Follow this event on Twitter: #Cybercrime 13
  • 14. EXAMPLES  Former employee was convicted of exporting sensitive military technology to China  Thousands of electronic files were stolen from employer which detailed the performance and design of guidance systems for missiles, rockets, target locators and unmanned aerial vehicles.  The US spends billions of dollars annually on R&D which if used by a third party could result in rapid development of rival products without the significant cost  Significant penalties and fines in the US  SA – damages to be proved Follow this event on Twitter: #Cybercrime 14
  • 15. EXAMPLES  Pittsburgh Corning Corp : two people charged with trying to purchase trade secrets for $100,000 to open rival plant in China  DuPont, US chemical company : 2 former employees and a third party conspired to steal trade secrets about a technology for Panang Group (one of China’s largest titanium pigment producers)  DuPont has also filed a civil case  DuPont : South Korea’s Industries hired ex- employees of DuPont to steal confidential information regarding a particular product. DuPont was awarded $1 billion in damages Follow this event on Twitter: #Cybercrime 15
  • 16. CONCLUDING REMARKS  The pervasiveness of digital platforms  Increase in internet users  Introduction of new technologies  The speed with which information can be exchanged  Contributory factors to assist in the age old crime of stealing, with the utilisation of sophisticated methods Follow this event on Twitter: #Cybercrime 16
  • 17. THANK YOU Janine Hollesen 11 October 2012 Nothing in this presentation should be construed as formal legal advice from any lawyer or this firm. Readers are advised to consult professional legal advisors for guidance on legislation which may affect their businesses. © 2012 Werksmans Incorporated trading as Werksmans Attorneys. All rights reserved. Follow this event on Twitter: #Cybercrime