Business Issues & Ethics – Lecture 7 Key Notes

Intellectual Property

  • Bundle of rights over creations of the mind; can be shared without loss.
  • Main legal protections: trademarks, trade secrets, copyrights, patents (see sections below).

Trademarks

  • Any word, name, symbol, or device identifying source of goods.
  • Do not expire; rights last indefinitely while mark is used.
  • Registration advantages: national enforcement, searchable database, blocks counterfeit imports.
  • Legal systems: first-to-use (e.g., USA, Canada) vs. first-to-file (e.g., China, EU).
  • Infringement = deceptive similarity; violates duty not to misrepresent.

Trade Secrets

  • Right to keep valuable information confidential; protection ends once revealed.
  • Indicators of protectability:
    • 1 security measures taken
    • 2 development cost
    • 3 value to competitors
  • Must balance employer secrecy claims with employee speech/mobility and public right to know.

Copyrights

  • Protect the written or recorded expression of ideas; arise automatically.
  • Exclusive rights: reproduction, derivative works, distribution, public performance & display.
  • Covers novels, music, software, databases, plans, etc.
  • In Hong Kong, term = 50 years after author’s death.

Patents

  • Protect inventions, machines, processes, compositions of matter.
  • Requirements: useful, novel, non-obvious.
  • Rights: exclude others from making, using, selling until patent expiry; reverse engineering allowed (but no direct copying).
  • Application must include full description, drawings, claims; maintenance fees required.
  • Ethical weight varies by industry (e.g., life-saving drugs vs. convenience goods).

Fair Use

  • Limited, no-permission use of copyrighted material for criticism, comment, news, teaching, scholarship, research.
  • Four factors: purpose/character, nature of work, amount/substantiality, market effect.

Business & Computers

  • IT introduces issues in crime, responsibility, privacy, and work patterns.

Computer Crime

  • 3 main forms: theft of funds/assets, theft of information, theft of computer time/access.
  • Malware (viruses, worms) universally condemned; spam largely viewed as intrusive.

Corporate Responsibility for IT

  • Humans, not machines, bear moral responsibility for computer-related harms.

Computers & Privacy

  • Firms collect customer data (locations, history) and employee data (emails, device metrics).
  • Key privacy types: information, electronic, physical, psychological.
  • Ownership of personal data, confidentiality duties, and ethics of data mining remain contested.
  • Legally, corporate hardware → company property; employee email generally not private.

Changing Nature of Work

  • Enabled by IT: flextime, teleworking, virtual organizations, overseas outsourcing.
  • Expert systems & AI may replace roles by 2030.
  • Digital divide dimensions: rich/poor societies, individuals, age groups, computer literacy.