Paris Convention · Berne Convention · Cybercrime · Nuclear Ethics
The Paris Convention for the Protection of Industrial Property (1967) is one of the earliest and most important international treaties on intellectual property. It establishes common rules among member nations for the protection of industrial property.
Contrary to a common misconception, the Paris Convention covers industrial property in a broad sense — not merely restricted to patents and trademarks. It includes:
Protects inventions granting exclusive rights to the inventor for a fixed period.
Distinctive signs identifying goods or services of one enterprise from others.
Also known as "petty patents" — short-term protection for less complex innovations. These ARE included, not excluded.
Protects the aesthetic and ornamental aspects of a product.
The convention does NOT apply to industrial property in a restricted sense. Utility models ARE covered — they are a form of small-scale or petty patent provided by some countries, not large-scale patents.
A crucial principle: patents granted in different contracting states for the same invention are independent of each other. Granting a patent in one country does not obligate other countries to grant it too, nor does rejection in one country mean automatic rejection elsewhere.
The Paris Convention has been amended three times, with revisions made in Hague (1925), London (1934), and Stockholm (1967). The Stockholm Act of 1967 is the current authoritative version.
All member countries that have ratified or acceded to the Convention constitute a "Union" for the purposes of protecting industrial property. Non-member countries are not part of this Union, even if they have some dealings with member states.
While the Paris Convention deals with industrial property, the Berne Convention for the Protection of Literary and Artistic Works (1971) governs copyright — the rights of authors, artists, and creators over their literary and artistic works.
Rights of the author to financially benefit from their work — reproduction, translation, adaptation, broadcasting, etc.
Rights independent of economic rights. These include the right of attribution (to claim authorship) and the right to object to any deformation, mutilation, or other modification that would harm the author's honour or reputation.
Moral rights under Berne are NOT transferable and remain with the author even after economic rights are sold. They specifically include the right to object to any derogatory action on the work.
The Paris Act (the 1971 Berne revision) contains a special appendix designed to help developing countries. However, it is important to understand what it actually says:
The Appendix does NOT allow unlimited free translation/reproduction. It allows developing countries to issue compulsory licenses (with remuneration) for translation and reproduction for educational purposes — the authorization of the right holder is replaced by a compulsory license mechanism, but payment/remuneration is generally still required.
TRIPS (Trade-Related Aspects of Intellectual Property Rights), administered by the WTO, incorporates Berne Convention standards. However, moral rights provisions of the Berne Convention are specifically excluded from TRIPS — meaning WTO members who are NOT party to the Berne Convention are NOT bound by the moral rights provisions.
The Berne Convention allows certain limitations and exceptions on economic rights — cases where protected works may be used without payment of compensation. This includes fair use for education, commentary, criticism, and news reporting. This is often referred to as the fair use/fair dealing doctrine.
S1 (False): Patents DO mention the name of the inventor.
S2 (True): Moral rights under Berne 1971 include the right to object to deformation.
S3 (False): The Appendix allows compulsory licenses with remuneration — not unrestricted free use.
S4 (False): WTO members not party to Berne are NOT bound by moral rights provisions.
The protection of computer software and digital content sits at the intersection of patent law and copyright law. Understanding which regime applies — and when — is critical.
A utility model is a form of intellectual property protection for inventions that is:
"Utility model is a kind of large scale patent" — this is FALSE. Utility models are precisely the opposite: small-scale, short-duration, lower-threshold protections.
Computer software is primarily protected by copyright (as a literary work) under the Berne Convention. However, certain software innovations embodied in a technical process may also qualify for patent protection, depending on national laws.
The source code, object code, and expression of the software as a creative work.
Technical inventions implemented through software — the underlying method or process, not just the code itself.
Digital information systems are prone to specific types of errors:
When Raghav's birthday (March 10, 1980) is listed as 03/10/1980 in a system — where the date format is misread (DD/MM vs MM/DD ambiguity) — this is a Data Recording Error. The correct data exists but is captured or stored incorrectly due to format inconsistency.
Understanding different types of cybercrimes and digital misconduct is essential for engineers who build and deploy systems. Here are the key categories tested in Week 4:
| Term | Definition | Example |
|---|---|---|
| Hacking | Gaining illegal, unauthorized access to computers, networks, or phone systems | Breaking into a government server without permission |
| Spam | Unsolicited, unwanted bulk commercial messages sent via digital channels | Suhita receiving repeated promotional messages from a salon she never subscribed to |
| Phishing | Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity | A fake bank email asking for password details |
| Key Logging | Secretly recording keystrokes made on a keyboard to capture sensitive data | Malware installed on a computer that records passwords typed |
| Cookie Theft | Stealing browser session cookies to impersonate an authenticated user | Hijacking a logged-in banking session |
| Data Recording Error | Data that is incorrectly captured or stored due to human or system error (not necessarily malicious) | Raghav's birthday stored in wrong date format |
| Transcription Error | Error occurring when copying or transferring data manually | Writing down a phone number with two digits swapped |
Spam vs Phishing: Spam is simply unsolicited advertising/messaging. Phishing is deceptive — it tries to steal information by impersonating a trusted source. Spam is annoying; phishing is malicious.
Engineers who work in the nuclear domain face unique ethical responsibilities. Nuclear ethics is a distinct branch of study that intersects engineering, public policy, national security, and environmental science.
"Always strike a good balance between public safety and commercial gain... Both should be at par while considering a nuclear related business practice." — This is incorrect. Public safety must always take precedence over commercial interests in nuclear practice. There is no "balance" when it comes to safety.
Treaties imposing limitations on military capability (types, numbers, deployment of weapons) without necessarily reducing the total military forces. Countries remain adversaries but agree to rules.
Strategy where a country maintains nuclear capability to deter adversaries from attacking. Follows the rationale of the first user principle — the threat of retaliation prevents first use.
The build-up or expansion of nuclear weapons stockpiles and delivery systems.
The actual reduction or elimination of military forces and weapons — distinct from arms control which only limits, not eliminates.
When two countries (M and N) enter treaties limiting military capability without reducing forces, this is Arms Control — not disarmament. Disarmament requires actual reduction of forces or weapons.
Engineers involved in nuclear technology must:
Statement 4 is the only correct one: "Amendments in the Paris Convention, 1967 can be associated with Hague, London and Stockholm." The other statements are false — the convention covers utility models (not excludes them), Common Rules were NOT rejected, and the Union is formed only by member countries.
A utility model is a small-scale or petty patent — not large-scale. It has a lower inventive threshold and shorter duration than standard patents.
The Assertion is false — patents are independent; granting in one state does NOT obligate others. The Reason is true — this independence is a core Paris Convention principle. Since R is true but does not support a false A, option d applies.
S1 is false (patents DO name the inventor). S2 is true (Berne moral rights include right to object to derogatory actions). S3 is false (Appendix does not give outright free-use permission). S4 is false (TRIPS excludes moral rights; WTO members not in Berne are not bound by them).
The correct data exists (March 10, 1980) but is stored incorrectly due to a date format inconsistency. This is a data recording error — not intentional, not a transcription error (which involves manual copying), not phishing or keylogging.
a (limitations on economic rights) → iii (Berne Convention). b (first user principle) → iv (Nuclear deterrence). c (illegal computer access) → i (Hacking). d (no reduction of forces) → ii (Arms control).
"Always strike a good balance between public safety and commercial gain — both should be at par." This is erroneous because public safety must always be the paramount concern in nuclear ethics, never traded off equally against commercial gain.
Spam refers to unsolicited bulk messages, typically commercial in nature. Unlike phishing, spam is not attempting to steal credentials — it is simply unwanted advertising.
Arms control involves agreed-upon limitations on military capability (types, numbers) while military forces remain in place. This is distinct from disarmament (actual reduction) and from nuclear armament (build-up).
The Paris Convention provides "National Treatment" (not "International Treatment") — so (i) is not a valid provision. The claim that improvement patents are excluded is also false, so (iv) is not a valid provision. Common Rules and coverage of industrial property including geographical indications ARE valid provisions.